Philippa J. Broadfoot
List of publications from the DBLP Bibliography Server - FAQ
2005 | ||
---|---|---|
13 | EE | Philippa J. Hopcroft, Guy H. Broadfoot: Combining the Box Structure Development Method and CSP for Software Development. Electr. Notes Theor. Comput. Sci. 128(6): 127-144 (2005) |
2004 | ||
12 | EE | Philippa J. Hopcroft, Guy H. Broadfoot: Combining the Box Structure Development Method and CSP. ASE 2004: 340-345 |
11 | EE | Philippa J. Hopcroft, Gavin Lowe: Analysing a stream authentication protocol using model checking. Int. J. Inf. Sec. 3(1): 2-13 (2004) |
10 | Philippa J. Broadfoot, A. W. Roscoe: Embedding agents within the intruder to detect parallel attacks. Journal of Computer Security 12(3-4): 379-408 (2004) | |
2003 | ||
9 | EE | Guy H. Broadfoot, Philippa J. Broadfoot: Academia and industry meet: Some experiences of formal methods in practice. APSEC 2003: 49- |
8 | EE | Philippa J. Broadfoot, Gavin Lowe: On Distributed Security Transactions that Use Secure Transport Protocols. CSFW 2003: 141- |
7 | EE | Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey: Managing Dynamic User Communities in a Grid of Autonomous Resources CoRR cs.DC/0306004: (2003) |
2002 | ||
6 | EE | Philippa J. Broadfoot, A. W. Roscoe: Capturing Parallel Attacks within the Data Independence Framework. CSFW 2002: 147-159 |
5 | EE | Philippa J. Broadfoot, Gavin Lowe: Analysing a Stream Authentication Protocol Using Model Checking. ESORICS 2002: 146-161 |
2000 | ||
4 | EE | Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe: Automating Data Independence. ESORICS 2000: 175-190 |
3 | Philippa J. Broadfoot, A. W. Roscoe: Tutorial on FDR and Its Applications. SPIN 2000: 322 | |
2 | EE | A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe: Data independent verification of crypto-protocols. Electr. Notes Theor. Comput. Sci. 40: (2000) |
1999 | ||
1 | A. W. Roscoe, Philippa J. Broadfoot: Proving Security Protocols with Model Checkers by Data Independence Techniques. Journal of Computer Security 7(1): (1999) |
1 | Roberto Alfieri | [7] |
2 | Franck Bonnassieux | [7] |
3 | Guy H. Broadfoot | [9] [12] [13] |
4 | Roberto Cecchini | [7] |
5 | Wim Som de Cerff | [7] |
6 | Vincenzo Ciaschini | [7] |
7 | Linda Cornwall | [7] |
8 | Ákos Frohner | [7] |
9 | Alberto Gianoli | [7] |
10 | David L. Groep | [7] |
11 | Joni Hahkala | [7] |
12 | Jens Jensen | [7] |
13 | David P. Kelsey | [7] |
14 | Daniel Kouril | [7] |
15 | Károly Lörentey | [7] |
16 | Gavin Lowe | [2] [4] [5] [7] [8] [11] |
17 | Andrew McNab | [7] |
18 | Olle Mulmo | [7] |
19 | A. W. Roscoe (A. William Roscoe, Bill Roscoe) | [1] [2] [3] [4] [6] [10] |
20 | Mika Silander | [7] |
21 | Fabio Spataro | [7] |
22 | Martijn Steenbakkers | [7] |
23 | Gerben Venekamp | [7] |
24 | Luca dell'Agnello | [7] |