Follow
James Heather
James Heather
Senior Lecturer in Computing, University of Surrey
Verified email at surrey.ac.uk
Title
Cited by
Cited by
Year
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Computer Security Foundations Workshop, 2000. CSFW-13. Proceedings. 13th …, 2000
3112000
Prêt à Voter: a voter-verifiable voting system
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
Information Forensics and Security, IEEE Transactions on 4 (4), 662-673, 2009
279*2009
The append-only web bulletin board
J Heather, D Lundin
Formal Aspects in Security and Trust: 5th International Workshop, FAST 2008 …, 2009
842009
Towards automatic verification of authentication protocols on an unbounded network
J Heather, S Schneider
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 132-143, 2000
772000
Using pret a voter in victorian state elections
C Burton, C Culnane, JA Heather, T Peacock, PYA Ryan, SA Schneider, ...
2012 Electronic Voting Technology/Workshop on Electronic Voting, ?-?, 2012
612012
Turnitoff: Identifying and fixing a hole in current plagiarism detection software
J Heather
Assessment & Evaluation in Higher Education 35 (6), 647-660, 2010
552010
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
Z Xia, SA Schneider, J Heather, J Traoré
Proceedings of the conference on Electronic Voting Technology (EVT), 13, 2008
482008
Implementing STV securely in Prêt à Voter
J Heather
20th IEEE Computer Security Foundations Symposium (CSF'07), 157-169, 2007
422007
A supervised verifiable voting protocol for the Victorian Electoral Commission
C Burton, C Culnane, J Heather, T Peacock, P Ryan, S Schneider, ...
Lecture Notes in Informatics 205, 82-95, 2012
402012
Pret a Voter: All-in-one
Z Xia, SA Schneider, J Heather, PYA Ryan, D Lundin, P Howard
Proceedings of the Workshop On Trustworthy Elections (WOTE) 2007, 47-56, 2007
322007
Pretty good democracy for more expressive voting schemes
J Heather, P Ryan, V Teague
ESORICS 2010, 405-423, 2011
302011
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, SA Schneider, ...
INDOCRYPT, 98-114, 2010
302010
A decision procedure for the existence of a rank function
J Heather, S Schneider
Journal of Computer Security 13 (2), 317-344, 2005
292005
Oh!... Is it really you?’using rank functions to verify authentication protocols
J Heather
PhD thesis, Royal Holloway, University of London, 2000
29*2000
Focus group views on Prêt à Voter 1.0
S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia
2011 International Workshop on Requirements Engineering for Electronic …, 2011
272011
Experiences gained from the first pret a voter implementation
D Bismark, J Heather, RMA Peel, S Schneider, Z Xia, PYA Ryan
2009 First International Workshop on Requirements Engineering for e-Voting …, 2009
222009
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness
SA Schneider, JA Heather
Formal Methods (FM) 2012 7436, 217-231, 2012
20*2012
A theorem-proving approach to verification of fair non-repudiation protocols
K Wei, J Heather
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
182007
Embedding the stable failures model of CSP in PVS
K Wei, J Heather
Integrated Formal Methods: 5th International Conference, IFM 2005, Eindhoven …, 2005
162005
Strand spaces and rank functions: More than distant cousins
J Heather
162002
The system can't perform the operation now. Try again later.
Articles 1–20