|
Search the dblp DataBase
Philippa J. Broadfoot:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Guy H. Broadfoot, Philippa J. Broadfoot
Academia and industry meet: Some experiences of formal methods in practice. [Citation Graph (0, 0)][DBLP] APSEC, 2003, pp:49-0 [Conf]
- Philippa J. Broadfoot, Gavin Lowe
On Distributed Security Transactions that Use Secure Transport Protocols. [Citation Graph (0, 0)][DBLP] CSFW, 2003, pp:141-0 [Conf]
- Philippa J. Broadfoot, A. W. Roscoe
Capturing Parallel Attacks within the Data Independence Framework. [Citation Graph (0, 0)][DBLP] CSFW, 2002, pp:147-159 [Conf]
- Philippa J. Broadfoot, Gavin Lowe
Analysing a Stream Authentication Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP] ESORICS, 2002, pp:146-161 [Conf]
- Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe
Automating Data Independence. [Citation Graph (0, 0)][DBLP] ESORICS, 2000, pp:175-190 [Conf]
- Philippa J. Broadfoot, A. W. Roscoe
Tutorial on FDR and Its Applications. [Citation Graph (0, 0)][DBLP] SPIN, 2000, pp:322- [Conf]
- Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey
Managing Dynamic User Communities in a Grid of Autonomous Resources [Citation Graph (0, 0)][DBLP] CoRR, 2003, v:0, n:, pp:- [Journal]
- A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe
Data independent verification of crypto-protocols. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal]
- Philippa J. Broadfoot, A. W. Roscoe
Embedding agents within the intruder to detect parallel attacks. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:3-4, pp:379-408 [Journal]
- A. W. Roscoe, Philippa J. Broadfoot
Proving Security Protocols with Model Checkers by Data Independence Techniques. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
Search in 0.001secs, Finished in 0.002secs
|