What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Steve A. Schneider
Google Scholar
ORCID:
0000-0001-8365-6993
17
publications in security and cryptology related venues
Year
Venue
Title
2020
journals/tifs
Anonymous Single Sign-On With Proxy Re-Verification.
Jinguang Han
Liqun Chen
Steve A. Schneider
Helen Treharne
Stephan Wesemeyer
Nick Wilson
2019
conf/eurosp
A Symbolic Analysis of ECC-Based Direct Anonymous Attestation.
Jorden Whitefield
Liqun Chen
Ralf Sasse
Steve A. Schneider
Helen Treharne
Stephan Wesemeyer
2018
conf/esorics
Anonymous Single-Sign-On for n Designated Services with Traceability.
Jinguang Han
Liqun Chen
Steve A. Schneider
Helen Treharne
Stephan Wesemeyer
2014
journals/istr
Special Section on Vote-ID 2013.
Steve A. Schneider
Vanessa Teague
Chris Culnane
James Heather
2014
conf/uss
Faster Print on Demand for Prêt à Voter.
Chris Culnane
James Heather
Rui Joaquim
Peter Y. A. Ryan
Steve A. Schneider
Vanessa Teague
2013
conf/uss
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Morgan Llewellyn
Steve A. Schneider
Zhe Xia
Chris Culnane
James Heather
Peter Y. A. Ryan
Sriramkrishnan Srinivasan
2012
conf/uss
Using Prêt à Voter in Victoria State Elections.
Craig Burton
Chris Culnane
James Heather
Thea Peacock
Peter Y. A. Ryan
Steve A. Schneider
Vanessa Teague
Roland Wen
Zhe Xia
Sriramkrishnan Srinivasan
2011
conf/uss
Authentication Codes.
Chris Culnane
David Bismark
James Heather
Steve A. Schneider
Sriramkrishnan Srinivasan
Zhe Xia
2009
journals/compsec
Specifying authentication using signal events in CSP.
Siraj A. Shaikh
Vicky J. Bush
Steve A. Schneider
2009
journals/tifs
Prêt à voter: a voter-verifiable voting system.
Peter Y. A. Ryan
David Bismark
James Heather
Steve A. Schneider
Zhe Xia
2008
conf/uss
Analysis, Improvement, and Simplification of Prêt à Voter with Paillier Encryption.
Zhe Xia
Steve A. Schneider
James Heather
Jacques Traoré
2006
conf/esorics
Prêt à Voter with Re-encryption Mixes.
Peter Y. A. Ryan
Steve A. Schneider
2005
conf/esorics
A Practical Voter-Verifiable Election Scheme.
David Chaum
Peter Y. A. Ryan
Steve A. Schneider
2002
conf/esorics
Equal To The Task?
James Heather
Steve A. Schneider
2000
conf/esorics
Analysing Time Dependent Security Properties in CSP Using PVS.
Neil Evans
Steve A. Schneider
1996
conf/sp
Security Properties and CSP.
Steve A. Schneider
1996
conf/esorics
CSP and Anonymity.
Steve A. Schneider
Abraham Sidiropoulos
Coauthors
Abraham Sidiropoulos
(1)
Chris Culnane
(5)
Craig Burton
(1)
David Bismark
(2)
David Chaum
(1)
Helen Treharne
(3)
Jacques Traoré
(1)
James Heather
(8)
Jinguang Han
(2)
Jorden Whitefield
(1)
Liqun Chen
(3)
Morgan Llewellyn
(1)
Neil Evans
(1)
Nick Wilson
(1)
Peter Y. A. Ryan
(6)
Ralf Sasse
(1)
Roland Wen
(1)
Rui Joaquim
(1)
Siraj A. Shaikh
(1)
Sriramkrishnan Srinivasan
(3)
Stephan Wesemeyer
(3)
Steve A. Schneider
(17)
Thea Peacock
(1)
Vanessa Teague
(3)
Vicky J. Bush
(1)
Zhe Xia
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to