Search the dblp DataBase
Gavin Lowe :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Philippa J. Broadfoot , Gavin Lowe On Distributed Security Transactions that Use Secure Transport Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:141-0 [Conf ] Roberto Gorrieri , Paul F. Syverson , Martín Abadi , Riccardo Focardi , Dieter Gollmann , Gavin Lowe , Catherine Meadows Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:79-82 [Conf ] James Heather , Gavin Lowe , Steve Schneider How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:255-268 [Conf ] Gavin Lowe Quantifying Information Flow. [Citation Graph (0, 0)][DBLP ] CSFW, 2002, pp:18-31 [Conf ] Gavin Lowe Some new attacks upon security protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:162-169 [Conf ] Gavin Lowe Casper: A Compiler for the Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:18-30 [Conf ] Gavin Lowe A Hierarchy of Authentication Specification. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:31-44 [Conf ] Gavin Lowe Towards a Completeness Result for Model Checking of Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:96-105 [Conf ] Mei Lin Hui , Gavin Lowe Safe Simplifying Transformations for Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:32-43 [Conf ] Christie Bolton , Gavin Lowe Analyses of the Reverse Path Forwarding Routing Algorithm. [Citation Graph (0, 0)][DBLP ] DSN, 2004, pp:485-494 [Conf ] Philippa J. Broadfoot , Gavin Lowe Analysing a Stream Authentication Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:146-161 [Conf ] Philippa J. Broadfoot , Gavin Lowe , A. W. Roscoe Automating Data Independence. [Citation Graph (0, 0)][DBLP ] ESORICS, 2000, pp:175-190 [Conf ] Gordon Thomas Rohrmair , Gavin Lowe Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. [Citation Graph (0, 0)][DBLP ] FASec, 2002, pp:205-220 [Conf ] Christie Bolton , Gavin Lowe On the Automatic Verification of Non-Standard Measures of Consistency. [Citation Graph (0, 0)][DBLP ] IWFM, 2003, pp:- [Conf ] Sharon Curtis , Gavin Lowe A Graphical Calculus. [Citation Graph (0, 0)][DBLP ] MPC, 1995, pp:214-231 [Conf ] Gavin Lowe Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. [Citation Graph (0, 0)][DBLP ] TACAS, 1996, pp:147-166 [Conf ] Gavin Lowe Scheduling-Oriented Models for Real-Time Systems. [Citation Graph (0, 0)][DBLP ] Comput. J., 1995, v:38, n:6, pp:443-456 [Journal ] Gavin Lowe , Hussein Zedan Refinement of Complex Systems: A Case Study. [Citation Graph (0, 0)][DBLP ] Comput. J., 1995, v:38, n:10, pp:785-800 [Journal ] Roberto Alfieri , Roberto Cecchini , Vincenzo Ciaschini , Luca dell'Agnello , Alberto Gianoli , Fabio Spataro , Franck Bonnassieux , Philippa J. Broadfoot , Gavin Lowe , Linda Cornwall , Jens Jensen , David P. Kelsey , Ákos Frohner , David L. Groep , Wim Som de Cerff , Martijn Steenbakkers , Gerben Venekamp , Daniel Kouril , Andrew McNab , Olle Mulmo , Mika Silander , Joni Hahkala , Károly Lörentey Managing Dynamic User Communities in a Grid of Autonomous Resources [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Gavin Lowe , Jim Davies Using CSP to Verify Sequential Consistency. [Citation Graph (0, 0)][DBLP ] Distributed Computing, 1999, v:12, n:2-3, pp:91-103 [Journal ] Christie Bolton , Gavin Lowe A Hierarchy of Failures-Based Models. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2004, v:96, n:, pp:129-152 [Journal ] Gavin Lowe , Joël Ouaknine On Timed Models and Full Abstraction. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:155, n:, pp:497-519 [Journal ] A. W. Roscoe , Philippa J. Broadfoot , Gavin Lowe Data independent verification of crypto-protocols. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal ] Philippa J. Hopcroft , Gavin Lowe Analysing a stream authentication protocol using model checking. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:3, n:1, pp:2-13 [Journal ] Gavin Lowe An Attack on the Needham-Schroeder Public-Key Authentication Protocol. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:56, n:3, pp:131-133 [Journal ] James Heather , Gavin Lowe , Steve Schneider How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:2, pp:217-244 [Journal ] Mei Lin Hui , Gavin Lowe Fault-Preserving Simplifying Transformations for Security Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:1/2, pp:3-46 [Journal ] Gavin Lowe Analysing Protocol Subject to Guessing Attacks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:1, pp:83-98 [Journal ] Gavin Lowe Defining information flow quantity. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:3-4, pp:619-653 [Journal ] Gavin Lowe Casper: A Compiler for the Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:1-2, pp:53-84 [Journal ] Gavin Lowe Towards a Completeness Result for Model Checking of Security Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal ] Sharon Curtis , Gavin Lowe Proofs with Graphs. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 1996, v:26, n:1-3, pp:197-216 [Journal ] Gavin Lowe Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. [Citation Graph (0, 0)][DBLP ] Software - Concepts and Tools, 1996, v:17, n:3, pp:93-102 [Journal ] Christie Bolton , Gavin Lowe A hierarchy of failures-based models: theory and application. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:330, n:3, pp:407-438 [Journal ] Gavin Lowe Semantic models for information flow. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:315, n:1, pp:209-256 [Journal ] Gavin Lowe Probabilistic and Prioritized Models of Timed CSP. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1995, v:138, n:2, pp:315-352 [Journal ] Gordon Thomas Rohrmair , Gavin Lowe Using data-independence in the analysis of intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2005, v:340, n:1, pp:82-101 [Journal ] Gavin Lowe , A. W. Roscoe Using CSP to Detect Errors in the TMN Protocol. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1997, v:23, n:10, pp:659-669 [Journal ] Specifying Secure Transport Channels. [Citation Graph (, )][DBLP ] Specifying and Modelling Secure Channels in Strand Spaces. [Citation Graph (, )][DBLP ] Analysing the Information Flow Properties of Object-Capability Patterns. [Citation Graph (, )][DBLP ] Extending CSP with Tests for Availability. [Citation Graph (, )][DBLP ] On Refinement-Closed Security Properties and Nondeterministic Compositions. [Citation Graph (, )][DBLP ] Counter Abstraction in the CSP/FDR setting. [Citation Graph (, )][DBLP ] On CSP Refinement Tests That Run Multiple Copies of a Process. [Citation Graph (, )][DBLP ] Search in 0.006secs, Finished in 0.010secs