Steve Schneider

6.1k total citations
118 papers, 2.4k citations indexed

About

Steve Schneider is a scholar working on Artificial Intelligence, Computer Networks and Communications and Computational Theory and Mathematics. According to data from OpenAlex, Steve Schneider has authored 118 papers receiving a total of 2.4k indexed citations (citations by other indexed papers that have themselves been cited), including 64 papers in Artificial Intelligence, 36 papers in Computer Networks and Communications and 31 papers in Computational Theory and Mathematics. Recurrent topics in Steve Schneider's work include Formal Methods in Verification (30 papers), Internet Traffic Analysis and Secure E-voting (26 papers) and Cryptography and Data Security (25 papers). Steve Schneider is often cited by papers focused on Formal Methods in Verification (30 papers), Internet Traffic Analysis and Secure E-voting (26 papers) and Cryptography and Data Security (25 papers). Steve Schneider collaborates with scholars based in United Kingdom, Australia and Luxembourg. Steve Schneider's co-authors include Peter Y. A. Ryan, James Heather, Gavin Lowe, Jim Davies, Helen Treharne, Michael Goldsmith, Bill Roscoe, Zhe Xia, Chris Culnane and Liqun Chen and has published in prestigious journals such as Journal of Neurology Neurosurgery & Psychiatry, IEEE Transactions on Software Engineering and The Astrophysical Journal Supplement Series.

In The Last Decade

Steve Schneider

109 papers receiving 2.2k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Steve Schneider United Kingdom 25 1.3k 923 860 621 296 118 2.4k
Joachim Parrow Sweden 17 2.3k 1.7× 1.1k 1.2× 607 0.7× 1.7k 2.8× 90 0.3× 50 3.1k
Lingyu Wang Canada 28 854 0.6× 1.6k 1.7× 1.6k 1.8× 24 0.0× 275 0.9× 138 2.8k
Tobias Nipkow Germany 22 3.1k 2.3× 638 0.7× 467 0.5× 2.2k 3.5× 68 0.2× 94 3.7k
Raymie Stata United States 12 1.3k 0.9× 722 0.8× 1.1k 1.3× 630 1.0× 147 0.5× 20 3.1k
Kai Cai Japan 23 431 0.3× 1.0k 1.1× 111 0.1× 733 1.2× 63 0.2× 137 2.5k
Lawrence C. Paulson United Kingdom 25 2.7k 2.0× 777 0.8× 662 0.8× 1.8k 2.9× 96 0.3× 114 3.3k
Nachum Dershowitz Israel 24 2.2k 1.6× 259 0.3× 209 0.2× 1.7k 2.7× 23 0.1× 153 2.8k
Davide Sangiorgi Italy 24 2.1k 1.6× 846 0.9× 320 0.4× 1.5k 2.4× 88 0.3× 83 2.5k
Brent Waters United States 31 9.1k 6.8× 1.6k 1.7× 5.4k 6.2× 2.1k 3.4× 575 1.9× 64 10.1k
Alexander Romanovsky United Kingdom 20 798 0.6× 1.1k 1.2× 890 1.0× 265 0.4× 38 0.1× 264 2.0k

Countries citing papers authored by Steve Schneider

Since Specialization
Citations

This map shows the geographic impact of Steve Schneider's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Steve Schneider with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Steve Schneider more than expected).

Fields of papers citing papers by Steve Schneider

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Steve Schneider. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Steve Schneider. The network helps show where Steve Schneider may publish in the future.

Co-authorship network of co-authors of Steve Schneider

This figure shows the co-authorship network connecting the top 25 collaborators of Steve Schneider. A scholar is included among the top collaborators of Steve Schneider based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Steve Schneider. Steve Schneider is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Sako, Kazue, Steve Schneider, & Peter Y. A. Ryan. (2019). Computer Security – ESORICS 2019 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings, Part II. CERN Document Server (European Organization for Nuclear Research). 5 indexed citations
2.
Culnane, Chris, Peter Y. A. Ryan, Steve Schneider, & Vanessa Teague. (2014). vVote: a Verifiable Voting System (DRAFT).. arXiv (Cornell University). 2 indexed citations
3.
Culnane, Chris, et al.. (2014). Faster print on demand for Prêt à Voter. Open Repository and Bibliography (University of Luxembourg). 2(1). 1 indexed citations
4.
Culnane, Chris, et al.. (2013). Software Design for VEC vVote System. Surrey Research Insight Open Access (The University of Surrey).
5.
Moller, Faron, Hoang Nga Nguyen, Markus Roggenbach, Steve Schneider, & Helen Treharne. (2013). Defining and Model Checking Abstractions of Complex Railway Models Using CSP||B. Lecture notes in computer science. 193–208. 2 indexed citations
6.
Dutertre, Bruno & Steve Schneider. (2013). Embedding CSP in PVS: An Application to Authentication Protocols. IEEE Journal of Biomedical and Health Informatics. PP. 2 indexed citations
7.
Culnane, Chris, James Heather, Peter Y. A. Ryan, et al.. (2012). Using Prêt à Voter in Victorian state elections. Surrey Research Insight Open Access (The University of Surrey). 1–1. 8 indexed citations
8.
Xia, Zhe, Steve Schneider, James Heather, & Jacques Traoré. (2008). Analysis, improvement and simplification of Prêt à voter with Paillier encryption. Surrey Research Insight Open Access (The University of Surrey). 13. 13 indexed citations
9.
Treharne, Helen, et al.. (2007). Tear and Destroy: Chain voting and destruction problems shared by Pret a Voter and Punchscan and a solution using Visual Encryption. View. 1 indexed citations
10.
Schneider, Steve. (2007). The View from Here: The Story of the George Rogers Clark Statue in Quincy, Illinois. 100(4). 360.
11.
Dimitrakos, Theo, Filippo Martinelli, Peter Y. A. Ryan, & Steve Schneider. (2006). Formal aspects in security and trust : Third International Workshop, FAST 2005 : Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers. Springer eBooks. 1 indexed citations
12.
Treharne, Helen, et al.. (2005). ZB 2005 : formal specification and development in Z and B : 4th International Conference of B and Z Users, Guildford, UK, April 13-15, 2005 : proceedings. Springer eBooks. 2 indexed citations
13.
Chaum, David, Peter Y. A. Ryan, & Steve Schneider. (2005). A Practical Voter-Verifiable Election Scheme.. Surrey Research Insight Open Access (The University of Surrey). 25 indexed citations
14.
Schneider, Steve, et al.. (2004). Towards the Rank Function Verification of Protocols That Use Temporary Secrets. Surrey Research Insight Open Access (The University of Surrey). 1 indexed citations
15.
Abdallah, Ali, et al.. (2003). Formal aspects of security : first International Conference, FASec 2002 : London, UK, December 16-18, 2002 : revised papers. Springer eBooks. 1 indexed citations
16.
Schneider, Steve. (2001). Process Algebra and Security. View. 37–38. 1 indexed citations
17.
Schneider, Steve. (2001). The B-Method: an Introduction. Surrey Research Insight Open Access (The University of Surrey). 53 indexed citations
18.
Ryan, Peter Y. A., Steve Schneider, Michael Goldsmith, Gavin Lowe, & Bill Roscoe. (2001). Modelling and analysis of security protocols. View. 153 indexed citations
19.
Schneider, Steve, et al.. (1994). Modelling of chlorine concentration in water supply systems directed to integrated operational control. 143–159. 5 indexed citations
20.
Schneider, Steve, et al.. (1991). Timed CSP: Theory and Practice. View. 38 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026