The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gavin Lowe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philippa J. Broadfoot, Gavin Lowe
    On Distributed Security Transactions that Use Secure Transport Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:141-0 [Conf]
  2. Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows
    Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:79-82 [Conf]
  3. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:255-268 [Conf]
  4. Gavin Lowe
    Quantifying Information Flow. [Citation Graph (0, 0)][DBLP]
    CSFW, 2002, pp:18-31 [Conf]
  5. Gavin Lowe
    Some new attacks upon security protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:162-169 [Conf]
  6. Gavin Lowe
    Casper: A Compiler for the Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:18-30 [Conf]
  7. Gavin Lowe
    A Hierarchy of Authentication Specification. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:31-44 [Conf]
  8. Gavin Lowe
    Towards a Completeness Result for Model Checking of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:96-105 [Conf]
  9. Mei Lin Hui, Gavin Lowe
    Safe Simplifying Transformations for Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:32-43 [Conf]
  10. Christie Bolton, Gavin Lowe
    Analyses of the Reverse Path Forwarding Routing Algorithm. [Citation Graph (0, 0)][DBLP]
    DSN, 2004, pp:485-494 [Conf]
  11. Philippa J. Broadfoot, Gavin Lowe
    Analysing a Stream Authentication Protocol Using Model Checking. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:146-161 [Conf]
  12. Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe
    Automating Data Independence. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:175-190 [Conf]
  13. Gordon Thomas Rohrmair, Gavin Lowe
    Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. [Citation Graph (0, 0)][DBLP]
    FASec, 2002, pp:205-220 [Conf]
  14. Christie Bolton, Gavin Lowe
    On the Automatic Verification of Non-Standard Measures of Consistency. [Citation Graph (0, 0)][DBLP]
    IWFM, 2003, pp:- [Conf]
  15. Sharon Curtis, Gavin Lowe
    A Graphical Calculus. [Citation Graph (0, 0)][DBLP]
    MPC, 1995, pp:214-231 [Conf]
  16. Gavin Lowe
    Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. [Citation Graph (0, 0)][DBLP]
    TACAS, 1996, pp:147-166 [Conf]
  17. Gavin Lowe
    Scheduling-Oriented Models for Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1995, v:38, n:6, pp:443-456 [Journal]
  18. Gavin Lowe, Hussein Zedan
    Refinement of Complex Systems: A Case Study. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1995, v:38, n:10, pp:785-800 [Journal]
  19. Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey
    Managing Dynamic User Communities in a Grid of Autonomous Resources [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  20. Gavin Lowe, Jim Davies
    Using CSP to Verify Sequential Consistency. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 1999, v:12, n:2-3, pp:91-103 [Journal]
  21. Christie Bolton, Gavin Lowe
    A Hierarchy of Failures-Based Models. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:96, n:, pp:129-152 [Journal]
  22. Gavin Lowe, Joël Ouaknine
    On Timed Models and Full Abstraction. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:155, n:, pp:497-519 [Journal]
  23. A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe
    Data independent verification of crypto-protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:40, n:, pp:- [Journal]
  24. Philippa J. Hopcroft, Gavin Lowe
    Analysing a stream authentication protocol using model checking. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:3, n:1, pp:2-13 [Journal]
  25. Gavin Lowe
    An Attack on the Needham-Schroeder Public-Key Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:56, n:3, pp:131-133 [Journal]
  26. James Heather, Gavin Lowe, Steve Schneider
    How to Prevent Type Flaw Attacks on Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:2, pp:217-244 [Journal]
  27. Mei Lin Hui, Gavin Lowe
    Fault-Preserving Simplifying Transformations for Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:1/2, pp:3-46 [Journal]
  28. Gavin Lowe
    Analysing Protocol Subject to Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:1, pp:83-98 [Journal]
  29. Gavin Lowe
    Defining information flow quantity. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:3-4, pp:619-653 [Journal]
  30. Gavin Lowe
    Casper: A Compiler for the Analysis of Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:1-2, pp:53-84 [Journal]
  31. Gavin Lowe
    Towards a Completeness Result for Model Checking of Security Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:- [Journal]
  32. Sharon Curtis, Gavin Lowe
    Proofs with Graphs. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 1996, v:26, n:1-3, pp:197-216 [Journal]
  33. Gavin Lowe
    Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. [Citation Graph (0, 0)][DBLP]
    Software - Concepts and Tools, 1996, v:17, n:3, pp:93-102 [Journal]
  34. Christie Bolton, Gavin Lowe
    A hierarchy of failures-based models: theory and application. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:330, n:3, pp:407-438 [Journal]
  35. Gavin Lowe
    Semantic models for information flow. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:315, n:1, pp:209-256 [Journal]
  36. Gavin Lowe
    Probabilistic and Prioritized Models of Timed CSP. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1995, v:138, n:2, pp:315-352 [Journal]
  37. Gordon Thomas Rohrmair, Gavin Lowe
    Using data-independence in the analysis of intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:340, n:1, pp:82-101 [Journal]
  38. Gavin Lowe, A. W. Roscoe
    Using CSP to Detect Errors in the TMN Protocol. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1997, v:23, n:10, pp:659-669 [Journal]

  39. Specifying Secure Transport Channels. [Citation Graph (, )][DBLP]


  40. Specifying and Modelling Secure Channels in Strand Spaces. [Citation Graph (, )][DBLP]


  41. Analysing the Information Flow Properties of Object-Capability Patterns. [Citation Graph (, )][DBLP]


  42. Extending CSP with Tests for Availability. [Citation Graph (, )][DBLP]


  43. On Refinement-Closed Security Properties and Nondeterministic Compositions. [Citation Graph (, )][DBLP]


  44. Counter Abstraction in the CSP/FDR setting. [Citation Graph (, )][DBLP]


  45. On CSP Refinement Tests That Run Multiple Copies of a Process. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.007secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002