default search action
Gavin Lowe
Person information
- affiliation: University of Oxford, UK
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j31]Gavin Lowe:
Parameterized verification of systems with component identities, using view abstraction. Int. J. Softw. Tools Technol. Transf. 24(2): 287-324 (2022)
2010 – 2019
- 2019
- [j30]Gavin Lowe:
Discovering and correcting a deadlock in a channel implementation. Formal Aspects Comput. 31(4): 411-419 (2019) - [j29]Thomas Gibson-Robinson, Gavin Lowe:
Symmetry reduction in CSP model checking. Int. J. Softw. Tools Technol. Transf. 21(5): 567-605 (2019) - 2018
- [j28]Gavin Lowe:
Lock-free concurrent binomial heaps. J. Log. Algebraic Methods Program. 101: 44-87 (2018) - [c36]Gavin Lowe:
View Abstraction for Systems with Component Identities. FM 2018: 505-522 - 2017
- [j27]Gavin Lowe:
Testing for linearizability. Concurr. Comput. Pract. Exp. 29(4) (2017) - [c35]Thomas Gibson-Robinson, Guy H. Broadfoot, Gustavo Carvalho, Philippa J. Hopcroft, Gavin Lowe, Sidney C. Nogueira, Colin O'Halloran, Augusto Sampaio:
FDR: From Theory to Industrial Application. Concurrency, Security, and Puzzles 2017: 65-87 - [c34]Gavin Lowe:
Analysing Lock-Free Linearizable Datatypes Using CSP. Concurrency, Security, and Puzzles 2017: 162-184 - 2016
- [j26]Gavin Lowe:
Models for CSP with availability information. Math. Struct. Comput. Sci. 26(6): 1022-1053 (2016) - [j25]Gavin Lowe:
Concurrent depth-first search algorithms based on Tarjan's Algorithm. Int. J. Softw. Tools Technol. Transf. 18(2): 129-147 (2016) - 2015
- [j24]Thomas Gibson-Robinson, Allaa Kamil, Gavin Lowe:
Verifying layered security protocols. J. Comput. Secur. 23(3): 259-307 (2015) - 2014
- [j23]Tomasz Mazur, Gavin Lowe:
CSP-based counter abstraction for systems with node identifiers. Sci. Comput. Program. 81: 3-52 (2014) - [c33]Gavin Lowe:
Concurrent Depth-First Search Algorithms. TACAS 2014: 202-216 - [p2]Philip J. Armstrong, Gavin Lowe, Joël Ouaknine, Bill Roscoe:
Model checking Timed CSP. HOWARD-60 2014: 13-33 - 2012
- [j22]Tomasz Mazur, Gavin Lowe:
A type reduction theory for systems with replicated components. Log. Methods Comput. Sci. 8(1) (2012) - [j21]Alessandro Armando, Gavin Lowe:
Preface. J. Comput. Secur. 20(1): 1 (2012) - [c32]Philip J. Armstrong, Michael Goldsmith, Gavin Lowe, Joël Ouaknine, Hristina Palikareva, A. W. Roscoe, James Worrell:
Recent Developments in FDR. CAV 2012: 699-704 - [c31]Andrew Bate, Gavin Lowe:
A Debugger for Communicating Scala Objects. CPA 2012: 135-154 - 2011
- [j20]Allaa Kamil, Gavin Lowe:
Analysing TLS in the strand spaces model. J. Comput. Secur. 19(5): 975-1025 (2011) - [c30]Thomas Gibson-Robinson, Gavin Lowe:
Analysing Applications Layered on Unilaterally Authenticating Protocols. Formal Aspects in Security and Trust 2011: 164-181 - [c29]Gavin Lowe:
Implementing Generalised Alt - A Case Study in Validated Design using CSP. CPA 2011: 1-34 - [p1]Gavin Lowe:
Analysing Security Protocols using CSP. Formal Models and Techniques for Analyzing Security Protocols 2011: 62-85 - [e1]Alessandro Armando, Gavin Lowe:
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers. Lecture Notes in Computer Science 6186, Springer 2011, ISBN 978-3-642-16073-8 [contents] - 2010
- [c28]Allaa Kamil, Gavin Lowe:
Understanding Abstractions of Secure Channels. Formal Aspects in Security and Trust 2010: 50-64 - [c27]Gavin Lowe:
Models for CSP with availability information. EXPRESS 2010: 91-105
2000 – 2009
- 2009
- [c26]Toby C. Murray, Gavin Lowe:
Analysing the Information Flow Properties of Object-Capability Patterns. Formal Aspects in Security and Trust 2009: 81-95 - [c25]Allaa Kamil, Gavin Lowe:
Specifying and Modelling Secure Channels in Strand Spaces. Formal Aspects in Security and Trust 2009: 233-247 - [c24]Gavin Lowe:
Extending CSP with Tests for Availability. CPA 2009: 325-347 - 2008
- [j19]Gavin Lowe:
Specification of communicating processes: temporal logic versus refusals-based refinement. Formal Aspects Comput. 20(3): 277-294 (2008) - [c23]Christopher Dilloway, Gavin Lowe:
Specifying Secure Transport Channels. CSF 2008: 210-223 - [c22]Toby C. Murray, Gavin Lowe:
On Refinement-Closed Security Properties and Nondeterministic Compositions. AVoCS 2008: 49-68 - 2007
- [c21]Gavin Lowe:
On CSP Refinement Tests That Run Multiple Copies of a Process. AVoCS 2007: 153-170 - [c20]Tomasz Mazur, Gavin Lowe:
Counter Abstraction in the CSP/FDR setting. AVoCS 2007: 171-186 - 2005
- [j18]Christie Bolton, Gavin Lowe:
A hierarchy of failures-based models: theory and application. Theor. Comput. Sci. 330(3): 407-438 (2005) - [j17]Gordon Thomas Rohrmair, Gavin Lowe:
Using data-independence in the analysis of intrusion detection systems. Theor. Comput. Sci. 340(1): 82-101 (2005) - [c19]Gavin Lowe, Joël Ouaknine:
On Timed Models and Full Abstraction. MFPS 2005: 497-519 - 2004
- [j16]Philippa J. Hopcroft, Gavin Lowe:
Analysing a stream authentication protocol using model checking. Int. J. Inf. Sec. 3(1): 2-13 (2004) - [j15]Gavin Lowe:
Analysing Protocol Subject to Guessing Attacks. J. Comput. Secur. 12(1): 83-98 (2004) - [j14]Gavin Lowe:
Defining information flow quantity. J. Comput. Secur. 12(3-4): 619-653 (2004) - [j13]Gavin Lowe:
Semantic models for information flow. Theor. Comput. Sci. 315(1): 209-256 (2004) - [c18]Christie Bolton, Gavin Lowe:
Analyses of the Reverse Path Forwarding Routing Algorithm. DSN 2004: 485-494 - 2003
- [j12]James Heather, Gavin Lowe, Steve A. Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. J. Comput. Secur. 11(2): 217-244 (2003) - [c17]Philippa J. Broadfoot, Gavin Lowe:
On Distributed Security Transactions that Use Secure Transport Protocols. CSFW 2003: 141- - [c16]Christie Bolton, Gavin Lowe:
On the Automatic Verification of Non-Standard Measures of Consistency. IWFM 2003 - [c15]Christie Bolton, Gavin Lowe:
A Hierarchy of Failures-Based Models. EXPRESS 2003: 129-152 - [i1]Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey:
Managing Dynamic User Communities in a Grid of Autonomous Resources. CoRR cs.DC/0306004 (2003) - 2002
- [c14]Gavin Lowe:
Quantifying Information Flow. CSFW 2002: 18-31 - [c13]Philippa J. Broadfoot, Gavin Lowe:
Analysing a Stream Authentication Protocol Using Model Checking. ESORICS 2002: 146-161 - [c12]Gordon Thomas Rohrmair, Gavin Lowe:
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. FASec 2002: 205-220 - 2001
- [j11]Mei Lin Hui, Gavin Lowe:
Fault-Preserving Simplifying Transformations for Security Protocols. J. Comput. Secur. 9(1/2): 3-46 (2001) - 2000
- [c11]James Heather, Gavin Lowe, Steve A. Schneider:
How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268 - [c10]Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe:
Automating Data Independence. ESORICS 2000: 175-190 - [c9]A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe:
Data independent verification of crypto-protocols. MFCSIT 2000: 359
1990 – 1999
- 1999
- [j10]Gavin Lowe, Jim Davies:
Using CSP to Verify Sequential Consistency. Distributed Comput. 12(2-3): 91-103 (1999) - [j9]Gavin Lowe:
Towards a Completeness Result for Model Checking of Security Protocols. J. Comput. Secur. 7(1): 89-146 (1999) - [c8]Mei Lin Hui, Gavin Lowe:
Safe Simplifying Transformations for Security Protocols. CSFW 1999: 32-43 - 1998
- [j8]Gavin Lowe:
Casper: A Compiler for the Analysis of Security Protocols. J. Comput. Secur. 6(1-2): 53-84 (1998) - [c7]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c6]Gavin Lowe:
Towards a Completeness Result for Model Checking of Security Protocols. CSFW 1998: 96-105 - 1997
- [j7]Gavin Lowe, A. W. Roscoe:
Using CSP to Detect Errors in the TMN Protocol. IEEE Trans. Software Eng. 23(10): 659-669 (1997) - [c5]Gavin Lowe:
Casper: A Compiler for the Analysis of Security Protocols. CSFW 1997: 18-30 - [c4]Gavin Lowe:
A Hierarchy of Authentication Specification. CSFW 1997: 31-44 - 1996
- [j6]Sharon Curtis, Gavin Lowe:
Proofs with Graphs. Sci. Comput. Program. 26(1-3): 197-216 (1996) - [j5]Gavin Lowe:
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. Softw. Concepts Tools 17(3): 93-102 (1996) - [c3]Gavin Lowe:
Some new attacks upon security protocols. CSFW 1996: 162-169 - [c2]Gavin Lowe:
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. TACAS 1996: 147-166 - 1995
- [j4]Gavin Lowe:
Scheduling-Oriented Models for Real-Time Systems. Comput. J. 38(6): 443-456 (1995) - [j3]Gavin Lowe, Hussein Zedan:
Refinement of Complex Systems: A Case Study. Comput. J. 38(10): 785-800 (1995) - [j2]Gavin Lowe:
An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Inf. Process. Lett. 56(3): 131-133 (1995) - [j1]Gavin Lowe:
Probabilistic and Prioritized Models of Timed CSP. Theor. Comput. Sci. 138(2): 315-352 (1995) - [c1]Sharon Curtis, Gavin Lowe:
A Graphical Calculus. MPC 1995: 214-231 - 1993
- [b1]Gavin Lowe:
Probabilities and priorities in timed CSP. University of Oxford, UK, 1993
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint