Showing 1 - 20 results of 41 for search 'Broadfoot, S', query time: 0.04s
Refine Results
-
1
-
2
-
3
The blot on the landscape: Fred Williams and Australian art history by Keith Broadfoot
Published 2014-12-01
Article -
4
Earle’s Lithography and the Force of Law by Keith Broadfoot
Published 2020-01-01
Article -
5
-
6
-
7
-
8
-
9
Embedding agents within the intruder to detect parallel attacks by Roscoe, A, Broadfoot, P
Published 2004Journal article -
10
Grid Security: Requirements and Technologies A Survey of the State−of−the−art by Broadfoot, P, Martin, A
Published 2003Report -
11
A Critical Survey of Grid Security Requirements and Technologies by Broadfoot, P, Martin, A
Published 2003Report -
12
Capturing parallel attacks within the data independence framework by Roscoe, A, Broadfoot, P
Published 2002Conference item -
13
Internalising Agents in CSP Protocol Models by Roscoe, A, Broadfoot, P
Published 2002Conference item -
14
Analysing a Stream Authentication Protocol Using Model Checking by Broadfoot, P, Lowe, G
Published 2002Conference item -
15
Proving security protocols with model checkers by data independence techniques by Roscoe, A, Broadfoot, P
Published 1999Journal article -
16
-
17
Combining the box structure development method and CSP for software development by Hopcroft, P, Broadfoot, G
Published 2005Journal article -
18
On Distributed Security Transactions that Use Secure Transport Protocols by Broadfoot, P, Lowe, G
Published 2003Conference item -
19
-
20
Entanglement percolation with bipartite mixed states by Broadfoot, S, Dorner, U, Jaksch, D
Published 2009Journal article