Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
PrÊt À Voter: a Voter-Verifiable Voting System
- P. Ryan, D. Bismark, J. Heather, S. Schneider, Zhe Xia
- Computer Science
- IEEE Transactions on Information Forensics and…
- 1 December 2009
TLDR
How to prevent type flaw attacks on security protocols
- J. Heather, G. Lowe, S. Schneider
- Computer Science
- Proceedings 13th IEEE Computer Security…
- 3 July 2000
TLDR
Turnitoff: identifying and fixing a hole in current plagiarism detection software
- J. Heather
- Computer Science
- 20 July 2010
TLDR
Decombinator: a tool for fast, efficient gene assignment in T-cell receptor sequences using a finite state machine
- Niclas Thomas, J. Heather, Wilfred Ndifon, John Shawe-Taylor, B. Chain
- Computer Science, Medicine
- Bioinform.
- 1 March 2013
TLDR
Epigenetic Control of Viral Life-Cycle by a DNA-Methylation Dependent Transcription Factor
- K. Flower, D. Thomas, J. Heather, Sharada Ramasubramanyan, Susan Jones, A. Sinclair
- Biology, Medicine
- PloS one
- 11 October 2011
Epstein-Barr virus (EBV) encoded transcription factor Zta (BZLF1, ZEBRA, EB1) is the prototype of a class of transcription factor (including C/EBPalpha) that interact with CpG-containing DNA response… Expand
How to prevent type flaw attacks on security protocols
- J. Heather, G. Lowe, Steve Schneider
- Computer Science
- 1 March 2003
TLDR
The Epstein–Barr virus lytic cycle activator Zta interacts with methylated ZRE in the promoter of host target gene egr1
- J. Heather, K. Flower, Samine J. Isaac, A. Sinclair
- Biology, Chemistry
- The Journal of general virology
- 1 June 2009
Activation of the host gene egr1 is essential for the lytic replication of Epstein–Barr virus (EBV). egr1 is activated by Zta (BZLF1, ZEBRA). Zta interacts directly with DNA through a series of… Expand
Implementing STV securely in Pret a Voter
- J. Heather
- Computer Science
- 20th IEEE Computer Security Foundations Symposium…
- 6 July 2007
TLDR
The Prêt à Voter Verifiable Election System
- P. Ryan, D. Bismark, J. Heather, S. Schneider, Zhe Xia
- Political Science
- 4 December 2009
The Prˆet `a Voter election system has undergone several revisions and enhancements since its inception in 2004, resulting in a family of election systems designed to provide end-to-end verifiability… Expand
- 32
- 2
- PDF
Towards automatic verification of authentication protocols on an unbounded network
- J. Heather, S. Schneider
- Computer Science
- Proceedings 13th IEEE Computer Security…
- 3 July 2000
TLDR