The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Philippa J. Broadfoot: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Guy H. Broadfoot, Philippa J. Broadfoot
    Academia and industry meet: Some experiences of formal methods in practice. [Citation Graph (0, 0)][DBLP]
    APSEC, 2003, pp:49-0 [Conf]
  2. Philippa J. Broadfoot, Gavin Lowe
    On Distributed Security Transactions that Use Secure Transport Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:141-0 [Conf]
  3. Philippa J. Broadfoot, A. W. Roscoe
    Capturing Parallel Attacks within the Data Independence Framework. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:147-159 [Conf]
  4. Philippa J. Broadfoot, Gavin Lowe
    Analysing a Stream Authentication Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:146-161 [Conf]
  5. Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe
    Automating Data Independence. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:175-190 [Conf]
  6. Philippa J. Broadfoot, A. W. Roscoe
    Tutorial on FDR and Its Applications. [Citation Graph (0, 0)][DBLP]
    SPIN, 2000, pp:322- [Conf]
  7. Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey
    Managing Dynamic User Communities in a Grid of Autonomous Resources [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  8. A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe
    Data independent verification of crypto-protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal]
  9. Philippa J. Broadfoot, A. W. Roscoe
    Embedding agents within the intruder to detect parallel attacks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:379-408 [Journal]
  10. A. W. Roscoe, Philippa J. Broadfoot
    Proving Security Protocols with Model Checkers by Data Independence Techniques. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]

Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002