James Heather
发表
Zhe Xia,
Steve A. Schneider,
Sriramkrishnan Srinivasan,
2011,
VoteID.
James Heather,
2006,
Security Protocols Workshop.
Zhe Xia,
Steve A. Schneider,
Sriramkrishnan Srinivasan,
2014,
NSS.
Zhe Xia,
Peter Y. A. Ryan,
Steve A. Schneider,
2009,
IEEE Transactions on Information Forensics and Security.
Steve A. Schneider,
James Heather,
J. Heather,
2000,
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
James Heather,
J. Heather,
2002,
Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
James Heather,
Kun Wei,
J. Heather,
2005,
IFM.
John Shawe-Taylor,
James Heather,
Niclas Thomas,
2013,
Bioinform..
James Heather,
Murat Moran,
2017,
ArXiv.
James Heather,
2000
.
James Heather,
David Lundin,
2008,
Formal Aspects in Security and Trust.
Nick Antonopoulos,
Roger M. A. Peel,
James Heather,
2005,
International Conference on Internet Computing.
James Heather,
1997
.
James Heather,
Murat Moran,
2013,
Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
James Heather,
Murat Moran,
2014
.
James Heather,
Jonathan Y. Clark,
2004,
Formal Aspects in Security and Trust.
Steve A. Schneider,
James Heather,
Murat Moran,
2013,
IFM.
Steve A. Schneider,
James Heather,
Efstathios Stathakidis,
2014,
SSR.
Zhe Xia,
Jacques Traoré,
Steve A. Schneider,
2008,
EVT.
Zhe Xia,
Peter Y. A. Ryan,
Steve A. Schneider,
2013,
EVT/WOTE.
Zhe Xia,
Steve A. Schneider,
Sriramkrishnan Srinivasan,
2011,
2011 International Workshop on Requirements Engineering for Electronic Voting Systems.
Zhe Xia,
Peter Y. A. Ryan,
Steve A. Schneider,
2012,
EVT/WOTE.
Zhe Xia,
Chris Culnane,
James Heather,
2013
.
James Heather,
Kun Wei,
2005,
Formal Aspects in Security and Trust.
Steve A. Schneider,
James Heather,
Steve Schneider,
2011
.
Peter Y. A. Ryan,
Steve A. Schneider,
Vanessa Teague,
2013,
EVT/WOTE.
Gavin Lowe,
Steve A. Schneider,
James Heather,
2000,
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13.
Zhe Xia,
Steve A. Schneider,
Sriramkrishnan Srinivasan,
2013,
CD-ARES Workshops.
Steve A. Schneider,
Vanessa Teague,
Chris Culnane,
2014,
J. Inf. Secur. Appl..
James Heather,
Kun Wei,
2006,
Formal Aspects in Security and Trust.
Steve A. Schneider,
James Heather,
J. Heather,
2005,
J. Comput. Secur..
Zhe Xia,
Steve A. Schneider,
Sriramkrishnan Srinivasan,
2010
.
Zhe Xia,
Peter Y. A. Ryan,
Steve A. Schneider,
2009,
2009 First International Workshop on Requirements Engineering for e-Voting Systems.
James Heather,
Efstathios Stathakidis,
David Moreton Williams,
2015,
Software & Systems Modeling.
James Heather,
Efstathios Stathakidis,
David Moreton Williams,
2014,
Electron. Commun. Eur. Assoc. Softw. Sci. Technol..
James Heather,
2010
.
Chris Culnane,
James Heather,
Steve Schneider,
2013
.
Steve A. Schneider,
James Heather,
Murat Moran,
2012,
Formal Aspects of Computing.
Gavin Lowe,
James Heather,
Steve Schneider,
2003
.
Steve A. Schneider,
James Heather,
2006,
SAC '06.
Peter Y. A. Ryan,
Vanessa Teague,
James Heather,
2010,
ESORICS.
James Heather,
J. Heather,
2007,
20th IEEE Computer Security Foundations Symposium (CSF'07).
Zhe Xia,
Peter Y. A. Ryan,
Steve A. Schneider,
2010,
INDOCRYPT.
Vanessa Teague,
James Heather,
Morgan Llewellyn,
2011,
VoteID.
Steve A. Schneider,
James Heather,
J. Heather,
2002,
ESORICS.
Steve A. Schneider,
Vanessa Teague,
James Heather,
2013,
Formal Aspects of Computing.
Vanessa Teague,
James Heather,
Steve Schneider,
2013,
Lecture Notes in Computer Science.
James Heather,
2000
.
James Heather,
2019
.
Zhe Xia,
Peter Y. A. Ryan,
Steve A. Schneider,
2012,
Electronic Voting.
Zhe Xia,
Steve A. Schneider,
Sriramkrishnan Srinivasan,
2011,
EVT/WOTE.
James Heather,
Kun Wei,
2006,
Security Protocols Workshop.
Steve A. Schneider,
James Heather,
Murat Moran,
2016,
Software & Systems Modeling.
Zhe Xia,
James Heather,
David Lundin,
2007
.
Steve A. Schneider,
James Heather,
2012,
FM.