Philippa J. Hopcroft

Affiliations:
  • University of Oxford, UK


According to our database1, Philippa J. Hopcroft authored at least 15 papers between 1999 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
FDR: From Theory to Industrial Application.
Proceedings of the Concurrency, Security, and Puzzles, 2017

2013
Slow Abstraction via Priority.
Proceedings of the Theories of Programming and Formal Methods, 2013

2004
Embedding agents within the intruder to detect parallel attacks.
J. Comput. Secur., 2004

Analysing a stream authentication protocol using model checking.
Int. J. Inf. Sec., 2004

Combining the Box Structure Development Method and CSP for Software Development.
Proceedings of the Fouth International Workshop on Automated Verification of Critical Systems, 2004

Combining the Box Structure Development Method and CSP.
Proceedings of the 19th IEEE International Conference on Automated Software Engineering (ASE 2004), 2004

2003
Managing Dynamic User Communities in a Grid of Autonomous Resources
CoRR, 2003

On Distributed Security Transactions that Use Secure Transport Protocols.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Academia and industry meet: Some experiences of formal methods in practice.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003

2002
Capturing Parallel Attacks within the Data Independence Framework.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Data independence in the model checking of security protocols.
PhD thesis, 2001

2000
Data independent verification of crypto-protocols.
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000

Tutorial on FDR and Its Applications.
Proceedings of the SPIN Model Checking and Software Verification, 7th International SPIN Workshop, Stanford, CA, USA, August 30, 2000

Automating Data Independence.
Proceedings of the Computer Security, 2000

1999
Proving Security Protocols with Model Checkers by Data Independence Techniques.
J. Comput. Secur., 1999


  Loading...