BibTeX records: Gavin Lowe

download as .bib file

@article{DBLP:journals/sttt/Lowe22,
  author       = {Gavin Lowe},
  title        = {Parameterized verification of systems with component identities, using
                  view abstraction},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {24},
  number       = {2},
  pages        = {287--324},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10009-022-00648-0},
  doi          = {10.1007/S10009-022-00648-0},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/Lowe22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/Lowe19,
  author       = {Gavin Lowe},
  title        = {Discovering and correcting a deadlock in a channel implementation},
  journal      = {Formal Aspects Comput.},
  volume       = {31},
  number       = {4},
  pages        = {411--419},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00165-019-00487-y},
  doi          = {10.1007/S00165-019-00487-Y},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/Lowe19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/Gibson-Robinson19,
  author       = {Thomas Gibson{-}Robinson and
                  Gavin Lowe},
  title        = {Symmetry reduction in {CSP} model checking},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {21},
  number       = {5},
  pages        = {567--605},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10009-019-00516-4},
  doi          = {10.1007/S10009-019-00516-4},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/Gibson-Robinson19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Lowe18,
  author       = {Gavin Lowe},
  title        = {Lock-free concurrent binomial heaps},
  journal      = {J. Log. Algebraic Methods Program.},
  volume       = {101},
  pages        = {44--87},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jlamp.2018.08.001},
  doi          = {10.1016/J.JLAMP.2018.08.001},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jlp/Lowe18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/Lowe18,
  author       = {Gavin Lowe},
  editor       = {Klaus Havelund and
                  Jan Peleska and
                  Bill Roscoe and
                  Erik P. de Vink},
  title        = {View Abstraction for Systems with Component Identities},
  booktitle    = {Formal Methods - 22nd International Symposium, {FM} 2018, Held as
                  Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July
                  15-17, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10951},
  pages        = {505--522},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95582-7\_30},
  doi          = {10.1007/978-3-319-95582-7\_30},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/Lowe18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/Lowe17,
  author       = {Gavin Lowe},
  title        = {Testing for linearizability},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {4},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3928},
  doi          = {10.1002/CPE.3928},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/Lowe17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Gibson-Robinson17,
  author       = {Thomas Gibson{-}Robinson and
                  Guy H. Broadfoot and
                  Gustavo Carvalho and
                  Philippa J. Hopcroft and
                  Gavin Lowe and
                  Sidney C. Nogueira and
                  Colin O'Halloran and
                  Augusto Sampaio},
  editor       = {Thomas Gibson{-}Robinson and
                  Philippa J. Hopcroft and
                  Ranko Lazic},
  title        = {{FDR:} From Theory to Industrial Application},
  booktitle    = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William
                  Roscoe on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {10160},
  pages        = {65--87},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-51046-0\_4},
  doi          = {10.1007/978-3-319-51046-0\_4},
  timestamp    = {Wed, 12 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Gibson-Robinson17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Lowe17,
  author       = {Gavin Lowe},
  editor       = {Thomas Gibson{-}Robinson and
                  Philippa J. Hopcroft and
                  Ranko Lazic},
  title        = {Analysing Lock-Free Linearizable Datatypes Using {CSP}},
  booktitle    = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William
                  Roscoe on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {10160},
  pages        = {162--184},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-51046-0\_9},
  doi          = {10.1007/978-3-319-51046-0\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Lowe17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mscs/Lowe16,
  author       = {Gavin Lowe},
  title        = {Models for {CSP} with availability information},
  journal      = {Math. Struct. Comput. Sci.},
  volume       = {26},
  number       = {6},
  pages        = {1022--1053},
  year         = {2016},
  url          = {https://doi.org/10.1017/S0960129514000334},
  doi          = {10.1017/S0960129514000334},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mscs/Lowe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/Lowe16,
  author       = {Gavin Lowe},
  title        = {Concurrent depth-first search algorithms based on Tarjan's Algorithm},
  journal      = {Int. J. Softw. Tools Technol. Transf.},
  volume       = {18},
  number       = {2},
  pages        = {129--147},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10009-015-0382-1},
  doi          = {10.1007/S10009-015-0382-1},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sttt/Lowe16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Gibson-Robinson15,
  author       = {Thomas Gibson{-}Robinson and
                  Allaa Kamil and
                  Gavin Lowe},
  title        = {Verifying layered security protocols},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {3},
  pages        = {259--307},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-150526},
  doi          = {10.3233/JCS-150526},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Gibson-Robinson15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/MazurL14,
  author       = {Tomasz Mazur and
                  Gavin Lowe},
  title        = {CSP-based counter abstraction for systems with node identifiers},
  journal      = {Sci. Comput. Program.},
  volume       = {81},
  pages        = {3--52},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.scico.2013.03.018},
  doi          = {10.1016/J.SCICO.2013.03.018},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/MazurL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/Lowe14,
  author       = {Gavin Lowe},
  editor       = {Erika {\'{A}}brah{\'{a}}m and
                  Klaus Havelund},
  title        = {Concurrent Depth-First Search Algorithms},
  booktitle    = {Tools and Algorithms for the Construction and Analysis of Systems
                  - 20th International Conference, {TACAS} 2014, Held as Part of the
                  European Joint Conferences on Theory and Practice of Software, {ETAPS}
                  2014, Grenoble, France, April 5-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8413},
  pages        = {202--216},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54862-8\_14},
  doi          = {10.1007/978-3-642-54862-8\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/Lowe14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:conf/birthday/ArmstrongLOR14,
  author       = {Philip J. Armstrong and
                  Gavin Lowe and
                  Jo{\"{e}}l Ouaknine and
                  Bill Roscoe},
  editor       = {Andrei Voronkov and
                  Margarita V. Korovina},
  title        = {Model checking Timed {CSP}},
  booktitle    = {{HOWARD-60:} {A} Festschrift on the Occasion of Howard Barringer's
                  60th Birthday},
  series       = {EPiC Series in Computing},
  volume       = {42},
  pages        = {13--33},
  publisher    = {EasyChair},
  year         = {2014},
  url          = {https://doi.org/10.29007/6fqk},
  doi          = {10.29007/6FQK},
  timestamp    = {Sun, 15 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ArmstrongLOR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1201-1716,
  author       = {Tomasz Mazur and
                  Gavin Lowe},
  title        = {A type reduction theory for systems with replicated components},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {8},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.2168/LMCS-8(1:4)2012},
  doi          = {10.2168/LMCS-8(1:4)2012},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1201-1716.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArmandoL12,
  author       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {1},
  pages        = {1},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0438},
  doi          = {10.3233/JCS-2011-0438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ArmandoL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ArmstrongGLOPRW12,
  author       = {Philip J. Armstrong and
                  Michael Goldsmith and
                  Gavin Lowe and
                  Jo{\"{e}}l Ouaknine and
                  Hristina Palikareva and
                  A. W. Roscoe and
                  James Worrell},
  editor       = {P. Madhusudan and
                  Sanjit A. Seshia},
  title        = {Recent Developments in {FDR}},
  booktitle    = {Computer Aided Verification - 24th International Conference, {CAV}
                  2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7358},
  pages        = {699--704},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31424-7\_52},
  doi          = {10.1007/978-3-642-31424-7\_52},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ArmstrongGLOPRW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wotug/BateL12,
  author       = {Andrew Bate and
                  Gavin Lowe},
  editor       = {Peter H. Welch and
                  Frederick R. M. Barnes and
                  Kevin Chalmers and
                  Jan B{\ae}kgaard Pedersen and
                  Adam T. Sampson},
  title        = {A Debugger for Communicating Scala Objects},
  booktitle    = {34th Communicating Process Architectures, {CPA} 2012, organised under
                  the auspices of WoTUG, Dundee, Scotland, UK, August 26, 2012},
  pages        = {135--154},
  publisher    = {Open Channel Publishing Ltd.},
  year         = {2012},
  url          = {http://wotug.org/paperdb/show\_pap.php?f=1\&\#38;num=666},
  timestamp    = {Tue, 09 Feb 2021 08:32:30 +0100},
  biburl       = {https://dblp.org/rec/conf/wotug/BateL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/KamilL11,
  author       = {Allaa Kamil and
                  Gavin Lowe},
  title        = {Analysing {TLS} in the strand spaces model},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {975--1025},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0429},
  doi          = {10.3233/JCS-2011-0429},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/KamilL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Gibson-RobinsonL11,
  author       = {Thomas Gibson{-}Robinson and
                  Gavin Lowe},
  editor       = {Gilles Barthe and
                  Anupam Datta and
                  Sandro Etalle},
  title        = {Analysing Applications Layered on Unilaterally Authenticating Protocols},
  booktitle    = {Formal Aspects of Security and Trust - 8th International Workshop,
                  {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7140},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29420-4\_11},
  doi          = {10.1007/978-3-642-29420-4\_11},
  timestamp    = {Sat, 19 Oct 2019 20:16:12 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/Gibson-RobinsonL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wotug/Lowe11,
  author       = {Gavin Lowe},
  editor       = {Peter H. Welch and
                  Adam T. Sampson and
                  Jan B{\ae}kgaard Pedersen and
                  Jon M. Kerridge and
                  Jan F. Broenink and
                  Frederick R. M. Barnes},
  title        = {Implementing Generalised Alt - {A} Case Study in Validated Design
                  using {CSP}},
  booktitle    = {33th Communicating Process Architectures Conference, {CPA} 2011, organised
                  under the auspices of WoTUG, Limerick, Ireland, June 19th, 2011},
  series       = {Concurrent Systems Engineering Series},
  volume       = {68},
  pages        = {1--34},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-774-1-1},
  doi          = {10.3233/978-1-60750-774-1-1},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wotug/Lowe11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ios/11/Lowe11,
  author       = {Gavin Lowe},
  editor       = {V{\'{e}}ronique Cortier and
                  Steve Kremer},
  title        = {Analysing Security Protocols using {CSP}},
  booktitle    = {Formal Models and Techniques for Analyzing Security Protocols},
  series       = {Cryptology and Information Security Series},
  volume       = {5},
  pages        = {62--85},
  publisher    = {{IOS} Press},
  year         = {2011},
  url          = {https://doi.org/10.3233/978-1-60750-714-7-62},
  doi          = {10.3233/978-1-60750-714-7-62},
  timestamp    = {Fri, 15 May 2020 12:11:04 +0200},
  biburl       = {https://dblp.org/rec/books/ios/11/Lowe11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2010wits,
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-16074-5},
  doi          = {10.1007/978-3-642-16074-5},
  isbn         = {978-3-642-16073-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KamilL10,
  author       = {Allaa Kamil and
                  Gavin Lowe},
  editor       = {Pierpaolo Degano and
                  Sandro Etalle and
                  Joshua D. Guttman},
  title        = {Understanding Abstractions of Secure Channels},
  booktitle    = {Formal Aspects of Security and Trust - 7th International Workshop,
                  {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6561},
  pages        = {50--64},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-19751-2\_4},
  doi          = {10.1007/978-3-642-19751-2\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KamilL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-1011-6434,
  author       = {Gavin Lowe},
  editor       = {Sibylle B. Fr{\"{o}}schle and
                  Frank D. Valencia},
  title        = {Models for {CSP} with availability information},
  booktitle    = {Proceedings 17th International Workshop on Expressiveness in Concurrency,
                  EXPRESS'10, Paris, France, August 30th, 2010},
  series       = {{EPTCS}},
  volume       = {41},
  pages        = {91--105},
  year         = {2010},
  url          = {https://doi.org/10.4204/EPTCS.41.7},
  doi          = {10.4204/EPTCS.41.7},
  timestamp    = {Wed, 12 Sep 2018 01:05:13 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1011-6434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/MurrayL09,
  author       = {Toby C. Murray and
                  Gavin Lowe},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Analysing the Information Flow Properties of Object-Capability Patterns},
  booktitle    = {Formal Aspects in Security and Trust, 6th International Workshop,
                  {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5983},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-12459-4\_7},
  doi          = {10.1007/978-3-642-12459-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/MurrayL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/KamilL09,
  author       = {Allaa Kamil and
                  Gavin Lowe},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Specifying and Modelling Secure Channels in Strand Spaces},
  booktitle    = {Formal Aspects in Security and Trust, 6th International Workshop,
                  {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5983},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-12459-4\_17},
  doi          = {10.1007/978-3-642-12459-4\_17},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/KamilL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wotug/Lowe09,
  author       = {Gavin Lowe},
  editor       = {Peter H. Welch and
                  Herman W. Roebbers and
                  Jan F. Broenink and
                  Fred R. M. Barnes and
                  Carl G. Ritson and
                  Adam T. Sampson and
                  Gardiner S. Stiles and
                  Brian Vinter},
  title        = {Extending {CSP} with Tests for Availability},
  booktitle    = {The thirty-second Communicating Process Architectures Conference,
                  {CPA} 2009, organised under the auspices of WoTUG, Eindhoven, The
                  Netherlands, 1-6 November 2009},
  series       = {Concurrent Systems Engineering Series},
  volume       = {67},
  pages        = {325--347},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-065-0-325},
  doi          = {10.3233/978-1-60750-065-0-325},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wotug/Lowe09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/Lowe08,
  author       = {Gavin Lowe},
  title        = {Specification of communicating processes: temporal logic versus refusals-based
                  refinement},
  journal      = {Formal Aspects Comput.},
  volume       = {20},
  number       = {3},
  pages        = {277--294},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00165-007-0065-0},
  doi          = {10.1007/S00165-007-0065-0},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/Lowe08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DillowayL08,
  author       = {Christopher Dilloway and
                  Gavin Lowe},
  title        = {Specifying Secure Transport Channels},
  booktitle    = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium,
                  {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008},
  pages        = {210--223},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSF.2008.14},
  doi          = {10.1109/CSF.2008.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DillowayL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MurrayL09,
  author       = {Toby C. Murray and
                  Gavin Lowe},
  editor       = {Alice Miller and
                  Muffy Calder},
  title        = {On Refinement-Closed Security Properties and Nondeterministic Compositions},
  booktitle    = {Proceedings of the Eighth International Workshop on Automated Verification
                  of Critical Systems, AVoCS 2008, Glasgow, UK, September 30 - October
                  1, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {250},
  number       = {2},
  pages        = {49--68},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.08.017},
  doi          = {10.1016/J.ENTCS.2009.08.017},
  timestamp    = {Fri, 24 Feb 2023 13:53:27 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MurrayL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/Lowe09,
  author       = {Gavin Lowe},
  editor       = {Michael Goldsmith and
                  Bill Roscoe},
  title        = {On {CSP} Refinement Tests That Run Multiple Copies of a Process},
  booktitle    = {Proceedings of the Seventh International Workshop on Automated Verification
                  of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {250},
  number       = {1},
  pages        = {153--170},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2009.08.011},
  doi          = {10.1016/J.ENTCS.2009.08.011},
  timestamp    = {Fri, 24 Feb 2023 13:48:46 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/Lowe09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MazurL09,
  author       = {Tomasz Mazur and
                  Gavin Lowe},
  editor       = {Michael Goldsmith and
                  Bill Roscoe},
  title        = {Counter Abstraction in the {CSP/FDR} setting},
  booktitle    = {Proceedings of the Seventh International Workshop on Automated Verification
                  of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {250},
  number       = {1},
  pages        = {171--186},
  publisher    = {Elsevier},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.entcs.2009.08.012},
  doi          = {10.1016/J.ENTCS.2009.08.012},
  timestamp    = {Fri, 24 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MazurL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/BoltonL05,
  author       = {Christie Bolton and
                  Gavin Lowe},
  title        = {A hierarchy of failures-based models: theory and application},
  journal      = {Theor. Comput. Sci.},
  volume       = {330},
  number       = {3},
  pages        = {407--438},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.tcs.2004.10.004},
  doi          = {10.1016/J.TCS.2004.10.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/BoltonL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/RohrmairL05,
  author       = {Gordon Thomas Rohrmair and
                  Gavin Lowe},
  title        = {Using data-independence in the analysis of intrusion detection systems},
  journal      = {Theor. Comput. Sci.},
  volume       = {340},
  number       = {1},
  pages        = {82--101},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.tcs.2005.03.004},
  doi          = {10.1016/J.TCS.2005.03.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/RohrmairL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LoweO06,
  author       = {Gavin Lowe and
                  Jo{\"{e}}l Ouaknine},
  editor       = {Mart{\'{\i}}n H{\"{o}}tzel Escard{\'{o}} and
                  Achim Jung and
                  Michael W. Mislove},
  title        = {On Timed Models and Full Abstraction},
  booktitle    = {Proceedings of the 21st Annual Conference on Mathematical Foundations
                  of Programming Semantics, {MFPS} 2005, Birmingham, UK, May 18-21,
                  2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {155},
  pages        = {497--519},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.11.070},
  doi          = {10.1016/J.ENTCS.2005.11.070},
  timestamp    = {Mon, 08 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/LoweO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HopcroftL04,
  author       = {Philippa J. Hopcroft and
                  Gavin Lowe},
  title        = {Analysing a stream authentication protocol using model checking},
  journal      = {Int. J. Inf. Sec.},
  volume       = {3},
  number       = {1},
  pages        = {2--13},
  year         = {2004},
  url          = {https://doi.org/10.1007/s10207-004-0040-1},
  doi          = {10.1007/S10207-004-0040-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/HopcroftL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lowe04,
  author       = {Gavin Lowe},
  title        = {Analysing Protocol Subject to Guessing Attacks},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {83--98},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12104},
  doi          = {10.3233/JCS-2004-12104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lowe04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lowe04a,
  author       = {Gavin Lowe},
  title        = {Defining information flow quantity},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {3-4},
  pages        = {619--653},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-123-410},
  doi          = {10.3233/JCS-2004-123-410},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lowe04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Lowe04,
  author       = {Gavin Lowe},
  title        = {Semantic models for information flow},
  journal      = {Theor. Comput. Sci.},
  volume       = {315},
  number       = {1},
  pages        = {209--256},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.tcs.2003.11.019},
  doi          = {10.1016/J.TCS.2003.11.019},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Lowe04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/BoltonL04,
  author       = {Christie Bolton and
                  Gavin Lowe},
  title        = {Analyses of the Reverse Path Forwarding Routing Algorithm},
  booktitle    = {2004 International Conference on Dependable Systems and Networks {(DSN}
                  2004), 28 June - 1 July 2004, Florence, Italy, Proceedings},
  pages        = {485--494},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/DSN.2004.1311918},
  doi          = {10.1109/DSN.2004.1311918},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/BoltonL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HeatherLS03,
  author       = {James Heather and
                  Gavin Lowe and
                  Steve A. Schneider},
  title        = {How to Prevent Type Flaw Attacks on Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {217--244},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11204},
  doi          = {10.3233/JCS-2003-11204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HeatherLS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/BroadfootL03,
  author       = {Philippa J. Broadfoot and
                  Gavin Lowe},
  title        = {On Distributed Security Transactions that Use Secure Transport Protocols},
  booktitle    = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003),
                  30 June - 2 July 2003, Pacific Grove, CA, {USA}},
  pages        = {141},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSFW.2003.1212710},
  doi          = {10.1109/CSFW.2003.1212710},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/BroadfootL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwfm/BoltonL03,
  author       = {Christie Bolton and
                  Gavin Lowe},
  editor       = {Joseph M. Morris and
                  Benjamin Aziz and
                  Fr{\'{e}}d{\'{e}}ric Oehl},
  title        = {On the Automatic Verification of Non-Standard Measures of Consistency},
  booktitle    = {6th International Workshop on Formal Methods, {IWFM} 2003, Dublin
                  City University, Ireland, 11 July, 2003},
  series       = {Workshops in Computing},
  publisher    = {{BCS}},
  year         = {2003},
  url          = {http://ewic.bcs.org/content/ConWebDoc/4024},
  timestamp    = {Tue, 19 Jun 2018 08:05:11 +0200},
  biburl       = {https://dblp.org/rec/conf/iwfm/BoltonL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BoltonL04,
  author       = {Christie Bolton and
                  Gavin Lowe},
  editor       = {Flavio Corradini and
                  Uwe Nestmann},
  title        = {A Hierarchy of Failures-Based Models},
  booktitle    = {Proceedings of the 10th International Workshop on Expressiveness in
                  Concurrency, {EXPRESS} 2003, Marseille, France, September 2, 2003},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {96},
  pages        = {129--152},
  publisher    = {Elsevier},
  year         = {2003},
  url          = {https://doi.org/10.1016/j.entcs.2004.04.025},
  doi          = {10.1016/J.ENTCS.2004.04.025},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/BoltonL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-DC-0306004,
  author       = {Roberto Alfieri and
                  Roberto Cecchini and
                  Vincenzo Ciaschini and
                  Luca dell'Agnello and
                  Alberto Gianoli and
                  Fabio Spataro and
                  Franck Bonnassieux and
                  Philippa J. Broadfoot and
                  Gavin Lowe and
                  Linda Cornwall and
                  Jens Jensen and
                  David P. Kelsey and
                  {\'{A}}kos Frohner and
                  David L. Groep and
                  Wim Som de Cerff and
                  Martijn Steenbakkers and
                  Gerben Venekamp and
                  Daniel Kouril and
                  Andrew McNab and
                  Olle Mulmo and
                  Mika Silander and
                  Joni Hahkala and
                  K{\'{a}}roly L{\"{o}}rentey},
  title        = {Managing Dynamic User Communities in a Grid of Autonomous Resources},
  journal      = {CoRR},
  volume       = {cs.DC/0306004},
  year         = {2003},
  url          = {http://arxiv.org/abs/cs/0306004},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/cs-DC-0306004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe02,
  author       = {Gavin Lowe},
  title        = {Quantifying Information Flow},
  booktitle    = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002),
                  24-26 June 2002, Cape Breton, Nova Scotia, Canada},
  pages        = {18--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2002.1021804},
  doi          = {10.1109/CSFW.2002.1021804},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BroadfootL02,
  author       = {Philippa J. Broadfoot and
                  Gavin Lowe},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Analysing a Stream Authentication Protocol Using Model Checking},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {146--161},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_9},
  doi          = {10.1007/3-540-45853-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BroadfootL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fasec/RohrmairL02,
  author       = {Gordon Thomas Rohrmair and
                  Gavin Lowe},
  editor       = {Ali E. Abdallah and
                  Peter Y. A. Ryan and
                  Steve A. Schneider},
  title        = {Using {CSP} to Detect Insertion and Evasion Possibilities within the
                  Intrusion Detection Area},
  booktitle    = {Formal Aspects of Security, First International Conference, FASec
                  2002, London, UK, December 16-18, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2629},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-3-540-40981-6\_17},
  doi          = {10.1007/978-3-540-40981-6\_17},
  timestamp    = {Wed, 15 Sep 2021 13:43:48 +0200},
  biburl       = {https://dblp.org/rec/conf/fasec/RohrmairL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/HuiL01,
  author       = {Mei Lin Hui and
                  Gavin Lowe},
  title        = {Fault-Preserving Simplifying Transformations for Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {3--46},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-91-202},
  doi          = {10.3233/JCS-2001-91-202},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/HuiL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HeatherLS00,
  author       = {James Heather and
                  Gavin Lowe and
                  Steve A. Schneider},
  title        = {How to Prevent Type Flaw Attacks on Security Protocols},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {255--268},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856942},
  doi          = {10.1109/CSFW.2000.856942},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HeatherLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BroadfootLR00,
  author       = {Philippa J. Broadfoot and
                  Gavin Lowe and
                  A. W. Roscoe},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Automating Data Independence},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_11},
  doi          = {10.1007/10722599\_11},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BroadfootLR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/RoscoeBL00,
  author       = {A. W. Roscoe and
                  Philippa J. Broadfoot and
                  Gavin Lowe},
  editor       = {Ted Hurley and
                  M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and
                  Michel P. Schellekens and
                  Anthony Karel Seda},
  title        = {Data independent verification of crypto-protocols},
  booktitle    = {First Irish Conference on the Mathematical Foundations of Computer
                  Science and Information Technology, {MFCSIT} 2000, Cork, Ireland,
                  July 20-21, 2000},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {40},
  pages        = {359},
  publisher    = {Elsevier},
  year         = {2000},
  url          = {https://doi.org/10.1016/S1571-0661(05)80062-3},
  doi          = {10.1016/S1571-0661(05)80062-3},
  timestamp    = {Wed, 30 Nov 2022 10:58:03 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/RoscoeBL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/LoweD99,
  author       = {Gavin Lowe and
                  Jim Davies},
  title        = {Using {CSP} to Verify Sequential Consistency},
  journal      = {Distributed Comput.},
  volume       = {12},
  number       = {2-3},
  pages        = {91--103},
  year         = {1999},
  url          = {https://doi.org/10.1007/s004460050060},
  doi          = {10.1007/S004460050060},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/LoweD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lowe99,
  author       = {Gavin Lowe},
  title        = {Towards a Completeness Result for Model Checking of Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {89--146},
  year         = {1999},
  url          = {https://doi.org/10.3233/jcs-1999-72-302},
  doi          = {10.3233/JCS-1999-72-302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lowe99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe99,
  author       = {Mei Lin Hui and
                  Gavin Lowe},
  title        = {Safe Simplifying Transformations for Security Protocols},
  booktitle    = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  pages        = {32--43},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSFW.1999.779760},
  doi          = {10.1109/CSFW.1999.779760},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Lowe98,
  author       = {Gavin Lowe},
  title        = {Casper: {A} Compiler for the Analysis of Security Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {6},
  number       = {1-2},
  pages        = {53--84},
  year         = {1998},
  url          = {https://doi.org/10.3233/jcs-1998-61-204},
  doi          = {10.3233/JCS-1998-61-204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Lowe98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GorrieriSAFGLM98,
  author       = {Roberto Gorrieri and
                  Paul F. Syverson and
                  Mart{\'{\i}}n Abadi and
                  Riccardo Focardi and
                  Dieter Gollmann and
                  Gavin Lowe and
                  Catherine Meadows},
  title        = {Panel Introduction: Varieties of Authentication},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {79--82},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.1998.10000},
  doi          = {10.1109/CSFW.1998.10000},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GorrieriSAFGLM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe98,
  author       = {Gavin Lowe},
  title        = {Towards a Completeness Result for Model Checking of Security Protocols},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {96--105},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683159},
  doi          = {10.1109/CSFW.1998.683159},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/LoweR97,
  author       = {Gavin Lowe and
                  A. W. Roscoe},
  title        = {Using {CSP} to Detect Errors in the {TMN} Protocol},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {23},
  number       = {10},
  pages        = {659--669},
  year         = {1997},
  url          = {https://doi.org/10.1109/32.637148},
  doi          = {10.1109/32.637148},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/LoweR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe97,
  author       = {Gavin Lowe},
  title        = {Casper: {A} Compiler for the Analysis of Security Protocols},
  booktitle    = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
                  1997, Rockport, Massachusetts, {USA}},
  pages        = {18--30},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSFW.1997.596779},
  doi          = {10.1109/CSFW.1997.596779},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe97a,
  author       = {Gavin Lowe},
  title        = {A Hierarchy of Authentication Specification},
  booktitle    = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
                  1997, Rockport, Massachusetts, {USA}},
  pages        = {31--44},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSFW.1997.596782},
  doi          = {10.1109/CSFW.1997.596782},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/CurtisL96,
  author       = {Sharon Curtis and
                  Gavin Lowe},
  title        = {Proofs with Graphs},
  journal      = {Sci. Comput. Program.},
  volume       = {26},
  number       = {1-3},
  pages        = {197--216},
  year         = {1996},
  url          = {https://doi.org/10.1016/0167-6423(95)00025-9},
  doi          = {10.1016/0167-6423(95)00025-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/CurtisL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/stp/Lowe96,
  author       = {Gavin Lowe},
  title        = {Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using
                  {FDR}},
  journal      = {Softw. Concepts Tools},
  volume       = {17},
  number       = {3},
  pages        = {93--102},
  year         = {1996},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/stp/Lowe96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Lowe96,
  author       = {Gavin Lowe},
  title        = {Some new attacks upon security protocols},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {162--169},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503701},
  doi          = {10.1109/CSFW.1996.503701},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/Lowe96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tacas/Lowe96,
  author       = {Gavin Lowe},
  editor       = {Tiziana Margaria and
                  Bernhard Steffen},
  title        = {Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using
                  {FDR}},
  booktitle    = {Tools and Algorithms for Construction and Analysis of Systems, Second
                  International Workshop, {TACAS} '96, Passau, Germany, March 27-29,
                  1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1055},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61042-1\_43},
  doi          = {10.1007/3-540-61042-1\_43},
  timestamp    = {Sun, 02 Jun 2019 21:19:27 +0200},
  biburl       = {https://dblp.org/rec/conf/tacas/Lowe96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Lowe95,
  author       = {Gavin Lowe},
  title        = {Scheduling-Oriented Models for Real-Time Systems},
  journal      = {Comput. J.},
  volume       = {38},
  number       = {6},
  pages        = {443--456},
  year         = {1995},
  url          = {https://doi.org/10.1093/comjnl/38.6.443},
  doi          = {10.1093/COMJNL/38.6.443},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Lowe95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LoweZ95,
  author       = {Gavin Lowe and
                  Hussein Zedan},
  title        = {Refinement of Complex Systems: {A} Case Study},
  journal      = {Comput. J.},
  volume       = {38},
  number       = {10},
  pages        = {785--800},
  year         = {1995},
  url          = {https://doi.org/10.1093/comjnl/38.10.785},
  doi          = {10.1093/COMJNL/38.10.785},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/LoweZ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Lowe95,
  author       = {Gavin Lowe},
  title        = {An Attack on the Needham-Schroeder Public-Key Authentication Protocol},
  journal      = {Inf. Process. Lett.},
  volume       = {56},
  number       = {3},
  pages        = {131--133},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)00144-2},
  doi          = {10.1016/0020-0190(95)00144-2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/Lowe95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/Lowe95,
  author       = {Gavin Lowe},
  title        = {Probabilistic and Prioritized Models of Timed {CSP}},
  journal      = {Theor. Comput. Sci.},
  volume       = {138},
  number       = {2},
  pages        = {315--352},
  year         = {1995},
  url          = {https://doi.org/10.1016/0304-3975(94)00171-E},
  doi          = {10.1016/0304-3975(94)00171-E},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/Lowe95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mpc/CurtisL95,
  author       = {Sharon Curtis and
                  Gavin Lowe},
  editor       = {Bernhard M{\"{o}}ller},
  title        = {A Graphical Calculus},
  booktitle    = {Mathematics of Program Construction, MPC'95, Kloster Irsee, Germany,
                  July 17-21, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {947},
  pages        = {214--231},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60117-1\_12},
  doi          = {10.1007/3-540-60117-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/mpc/CurtisL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Lowe93,
  author       = {Gavin Lowe},
  title        = {Probabilities and priorities in timed {CSP}},
  school       = {University of Oxford, {UK}},
  year         = {1993},
  url          = {http://ora.ox.ac.uk/objects/uuid:cfec28d9-aa50-46f3-a664-eb5fbe97b261},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Lowe93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}