Philippa J. Hopcroft Vis

Philippa J. Broadfoot

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

13EEPhilippa J. Hopcroft, Guy H. Broadfoot: Combining the Box Structure Development Method and CSP for Software Development. Electr. Notes Theor. Comput. Sci. 128(6): 127-144 (2005)
12EEPhilippa J. Hopcroft, Guy H. Broadfoot: Combining the Box Structure Development Method and CSP. ASE 2004: 340-345
11EEPhilippa J. Hopcroft, Gavin Lowe: Analysing a stream authentication protocol using model checking. Int. J. Inf. Sec. 3(1): 2-13 (2004)
10 Philippa J. Broadfoot, A. W. Roscoe: Embedding agents within the intruder to detect parallel attacks. Journal of Computer Security 12(3-4): 379-408 (2004)
9EEGuy H. Broadfoot, Philippa J. Broadfoot: Academia and industry meet: Some experiences of formal methods in practice. APSEC 2003: 49-
8EEPhilippa J. Broadfoot, Gavin Lowe: On Distributed Security Transactions that Use Secure Transport Protocols. CSFW 2003: 141-
7EERoberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey: Managing Dynamic User Communities in a Grid of Autonomous Resources CoRR cs.DC/0306004: (2003)
6EEPhilippa J. Broadfoot, A. W. Roscoe: Capturing Parallel Attacks within the Data Independence Framework. CSFW 2002: 147-159
5EEPhilippa J. Broadfoot, Gavin Lowe: Analysing a Stream Authentication Protocol Using Model Checking. ESORICS 2002: 146-161
4EEPhilippa J. Broadfoot, Gavin Lowe, A. W. Roscoe: Automating Data Independence. ESORICS 2000: 175-190
3 Philippa J. Broadfoot, A. W. Roscoe: Tutorial on FDR and Its Applications. SPIN 2000: 322
2EEA. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe: Data independent verification of crypto-protocols. Electr. Notes Theor. Comput. Sci. 40: (2000)
1 A. W. Roscoe, Philippa J. Broadfoot: Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security 7(1): (1999)

Coauthor Index

1Roberto Alfieri [7]
2Franck Bonnassieux [7]
3Guy H. Broadfoot [9] [12] [13]
4Roberto Cecchini [7]
5Wim Som de Cerff [7]
6Vincenzo Ciaschini [7]
7Linda Cornwall [7]
8Ákos Frohner [7]
9Alberto Gianoli [7]
10David L. Groep [7]
11Joni Hahkala [7]
12Jens Jensen [7]
13David P. Kelsey [7]
14Daniel Kouril [7]
15Károly Lörentey [7]
16Gavin Lowe [2] [4] [5] [7] [8] [11]
17Andrew McNab [7]
18Olle Mulmo [7]
19A. W. Roscoe (A. William Roscoe, Bill Roscoe) [1] [2] [3] [4] [6] [10]
20Mika Silander [7]
21Fabio Spataro [7]
22Martijn Steenbakkers [7]
23Gerben Venekamp [7]
24Luca dell'Agnello [7]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)