Follow
James Heather
James Heather
Senior Lecturer in Computing, University of Surrey
Verified email at surrey.ac.uk
Title
Cited by
Cited by
Year
How to prevent type flaw attacks on security protocols
J Heather, G Lowe, S Schneider
Computer Security Foundations Workshop, 2000. CSFW-13. Proceedings. 13th …, 2000
3162000
Prêt à Voter: a voter-verifiable voting system
PYA Ryan, D Bismark, J Heather, S Schneider, Z Xia
Information Forensics and Security, IEEE Transactions on 4 (4), 662-673, 2009
292*2009
The append-only web bulletin board
J Heather, D Lundin
Formal Aspects in Security and Trust: 5th International Workshop, FAST 2008 …, 2009
912009
Towards automatic verification of authentication protocols on an unbounded network
J Heather, S Schneider
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13, 132-143, 2000
772000
Using pret a voter in victorian state elections
C Burton, C Culnane, JA Heather, T Peacock, PYA Ryan, SA Schneider, ...
2012 Electronic Voting Technology/Workshop on Electronic Voting, ?-?, 2012
642012
Turnitoff: Identifying and fixing a hole in current plagiarism detection software
J Heather
Assessment & Evaluation in Higher Education 35 (6), 647-660, 2010
612010
Analysis, improvement and simplification of Prêt à voter with Paillier encryption
Z Xia, SA Schneider, J Heather, J Traoré
Proceedings of the conference on Electronic Voting Technology (EVT), 13, 2008
502008
Implementing STV securely in Prêt à Voter
J Heather
20th IEEE Computer Security Foundations Symposium (CSF'07), 157-169, 2007
432007
A supervised verifiable voting protocol for the Victorian Electoral Commission
C Burton, C Culane, J Heather, T Peacock, PYA Ryan, S Schneider, ...
Gesellschaft für Informatik eV, 2012
412012
Pret a Voter: All-in-one
Z Xia, SA Schneider, J Heather, PYA Ryan, D Lundin, P Howard
Proceedings of the Workshop On Trustworthy Elections (WOTE) 2007, 47-56, 2007
322007
Pretty good democracy for more expressive voting schemes
J Heather, P Ryan, V Teague
ESORICS 2010, 405-423, 2011
312011
Versatile Prêt à Voter: Handling multiple election methods with a unified interface
Z Xia, C Culnane, J Heather, H Jonker, PYA Ryan, S Schneider, ...
Progress in Cryptology-INDOCRYPT 2010: 11th International Conference on …, 2010
302010
A decision procedure for the existence of a rank function
J Heather, S Schneider
Journal of Computer Security 13 (2), 317-344, 2005
302005
Oh!... Is it really you?’using rank functions to verify authentication protocols
J Heather
PhD thesis, Royal Holloway, University of London, 2000
29*2000
Focus group views on Prêt à Voter 1.0
S Schneider, M Llewellyn, C Culnane, J Heather, S Srinivasan, Z Xia
2011 International Workshop on Requirements Engineering for Electronic …, 2011
272011
Cryptographic Protocols with Everyday Objects
J Heather, S Schneider, V Teague
Formal Aspects of Computing, 2013
212013
Experiences gained from the first pret a voter implementation
D Bismark, J Heather, RMA Peel, S Schneider, Z Xia, PYA Ryan
2009 First International Workshop on Requirements Engineering for e-Voting …, 2009
212009
A Formal Framework for Modelling Coercion Resistance and Receipt Freeness
SA Schneider, JA Heather
Formal Methods (FM) 2012 7436, 217-231, 2012
20*2012
A theorem-proving approach to verification of fair non-repudiation protocols
K Wei, J Heather
Formal Aspects in Security and Trust: Fourth International Workshop, FAST …, 2007
192007
Embedding the stable failures model of CSP in PVS
K Wei, J Heather
Integrated Formal Methods: 5th International Conference, IFM 2005, Eindhoven …, 2005
172005
The system can't perform the operation now. Try again later.
Articles 1–20