James Heather

According to our database1, James Heather authored at least 42 papers between 2000 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Automated Analysis of Voting Systems under an Active Intruder Model in CSP.
CoRR, 2017

2016
Constructing and verifying a robust Mix Net using CSP.
Softw. Syst. Model., 2016

Automated anonymity verification of the ThreeBallot and VAV voting systems.
Softw. Syst. Model., 2016

2014
Special Section on Vote-ID 2013.
J. Inf. Secur. Appl., 2014

Verifying anonymity in voting systems using CSP.
Formal Aspects Comput., 2014

Cryptographic protocols with everyday objects.
Formal Aspects Comput., 2014

Faster Print on Demand for Prêt à Voter.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

Robustness Modelling and Verification of a Mix Net Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Countering Ballot Stuffing and Incorporating Eligibility Verifiability in Helios.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Verifying a Mix Net in CSP.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2013

Automated Analysis of Voting Systems with Dolev-Yao Intruder Model.
Electron. Commun. Eur. Assoc. Softw. Sci. Technol., 2013

Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Automated Anonymity Verification of the ThreeBallot Voting System.
Proceedings of the Integrated Formal Methods, 10th International Conference, 2013

Solving the Discrete Logarithm Problem for Packing Candidate Preferences.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

A Formal Framework for Modelling Coercion Resistance and Receipt Freeness.
Proceedings of the FM 2012: Formal Methods, 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Prêt á Voter with Write-Ins.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

On the Side-Effects of Introducing E-Voting.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Authentication Codes.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Focus group views on Prêt à Voter 1.0.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

2010
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Pretty Good Democracy for More Expressive Voting Schemes.
Proceedings of the Computer Security, 2010

2009
Prêt à voter: a voter-verifiable voting system.
IEEE Trans. Inf. Forensics Secur., 2009

Experiences Gained from the first Prêt à Voter Implementation.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

2008
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

The Append-Only Web Bulletin Board.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

2007
Implementing STV securely in Pret a Voter.
Proceedings of the 20th IEEE Computer Security Foundations Symposium, 2007

2006
Where Next for Formal Methods?
Proceedings of the Security Protocols, 2006

Where Next for Formal Methods?
Proceedings of the Security Protocols, 2006

To infinity and beyond or, avoiding the infinite in security protocol analysis.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

2005
A decision procedure for the existence of a rank function.
J. Comput. Secur., 2005

Embedding the Stable Failures Model of CSP in PVS.
Proceedings of the Integrated Formal Methods, 5th International Conference, 2005

Towards Verification of Timed Non-repudiation Protocols.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

Programmable Agents for Generic Distributed Authorisation.
Proceedings of The 2005 International Conference on Internet Computing, 2005

2004
Family Secrets.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

2003
How to Prevent Type Flaw Attacks on Security Protocols.
J. Comput. Secur., 2003

2002
Equal To The Task?
Proceedings of the Computer Security, 2002

Strand Spaces and Rank Functions: More than Distant Cousins.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2000
Oh!... is it really you? : using rank functions to verify authentication protocols.
PhD thesis, 2000

Towards Automatic Verification of Authentication Protocols on an Unbounded Network.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000


  Loading...