default search action
BibTeX records: Gavin Lowe
@article{DBLP:journals/sttt/Lowe22, author = {Gavin Lowe}, title = {Parameterized verification of systems with component identities, using view abstraction}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {24}, number = {2}, pages = {287--324}, year = {2022}, url = {https://doi.org/10.1007/s10009-022-00648-0}, doi = {10.1007/S10009-022-00648-0}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/Lowe22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/Lowe19, author = {Gavin Lowe}, title = {Discovering and correcting a deadlock in a channel implementation}, journal = {Formal Aspects Comput.}, volume = {31}, number = {4}, pages = {411--419}, year = {2019}, url = {https://doi.org/10.1007/s00165-019-00487-y}, doi = {10.1007/S00165-019-00487-Y}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/Lowe19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/Gibson-Robinson19, author = {Thomas Gibson{-}Robinson and Gavin Lowe}, title = {Symmetry reduction in {CSP} model checking}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {21}, number = {5}, pages = {567--605}, year = {2019}, url = {https://doi.org/10.1007/s10009-019-00516-4}, doi = {10.1007/S10009-019-00516-4}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/Gibson-Robinson19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Lowe18, author = {Gavin Lowe}, title = {Lock-free concurrent binomial heaps}, journal = {J. Log. Algebraic Methods Program.}, volume = {101}, pages = {44--87}, year = {2018}, url = {https://doi.org/10.1016/j.jlamp.2018.08.001}, doi = {10.1016/J.JLAMP.2018.08.001}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jlp/Lowe18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/Lowe18, author = {Gavin Lowe}, editor = {Klaus Havelund and Jan Peleska and Bill Roscoe and Erik P. de Vink}, title = {View Abstraction for Systems with Component Identities}, booktitle = {Formal Methods - 22nd International Symposium, {FM} 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 15-17, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10951}, pages = {505--522}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95582-7\_30}, doi = {10.1007/978-3-319-95582-7\_30}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/Lowe18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/Lowe17, author = {Gavin Lowe}, title = {Testing for linearizability}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {4}, year = {2017}, url = {https://doi.org/10.1002/cpe.3928}, doi = {10.1002/CPE.3928}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/Lowe17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Gibson-Robinson17, author = {Thomas Gibson{-}Robinson and Guy H. Broadfoot and Gustavo Carvalho and Philippa J. Hopcroft and Gavin Lowe and Sidney C. Nogueira and Colin O'Halloran and Augusto Sampaio}, editor = {Thomas Gibson{-}Robinson and Philippa J. Hopcroft and Ranko Lazic}, title = {{FDR:} From Theory to Industrial Application}, booktitle = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {10160}, pages = {65--87}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-51046-0\_4}, doi = {10.1007/978-3-319-51046-0\_4}, timestamp = {Wed, 12 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Gibson-Robinson17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Lowe17, author = {Gavin Lowe}, editor = {Thomas Gibson{-}Robinson and Philippa J. Hopcroft and Ranko Lazic}, title = {Analysing Lock-Free Linearizable Datatypes Using {CSP}}, booktitle = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {10160}, pages = {162--184}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-51046-0\_9}, doi = {10.1007/978-3-319-51046-0\_9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Lowe17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mscs/Lowe16, author = {Gavin Lowe}, title = {Models for {CSP} with availability information}, journal = {Math. Struct. Comput. Sci.}, volume = {26}, number = {6}, pages = {1022--1053}, year = {2016}, url = {https://doi.org/10.1017/S0960129514000334}, doi = {10.1017/S0960129514000334}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mscs/Lowe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sttt/Lowe16, author = {Gavin Lowe}, title = {Concurrent depth-first search algorithms based on Tarjan's Algorithm}, journal = {Int. J. Softw. Tools Technol. Transf.}, volume = {18}, number = {2}, pages = {129--147}, year = {2016}, url = {https://doi.org/10.1007/s10009-015-0382-1}, doi = {10.1007/S10009-015-0382-1}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sttt/Lowe16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Gibson-Robinson15, author = {Thomas Gibson{-}Robinson and Allaa Kamil and Gavin Lowe}, title = {Verifying layered security protocols}, journal = {J. Comput. Secur.}, volume = {23}, number = {3}, pages = {259--307}, year = {2015}, url = {https://doi.org/10.3233/JCS-150526}, doi = {10.3233/JCS-150526}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Gibson-Robinson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/MazurL14, author = {Tomasz Mazur and Gavin Lowe}, title = {CSP-based counter abstraction for systems with node identifiers}, journal = {Sci. Comput. Program.}, volume = {81}, pages = {3--52}, year = {2014}, url = {https://doi.org/10.1016/j.scico.2013.03.018}, doi = {10.1016/J.SCICO.2013.03.018}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/MazurL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/Lowe14, author = {Gavin Lowe}, editor = {Erika {\'{A}}brah{\'{a}}m and Klaus Havelund}, title = {Concurrent Depth-First Search Algorithms}, booktitle = {Tools and Algorithms for the Construction and Analysis of Systems - 20th International Conference, {TACAS} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8413}, pages = {202--216}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54862-8\_14}, doi = {10.1007/978-3-642-54862-8\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/tacas/Lowe14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:conf/birthday/ArmstrongLOR14, author = {Philip J. Armstrong and Gavin Lowe and Jo{\"{e}}l Ouaknine and Bill Roscoe}, editor = {Andrei Voronkov and Margarita V. Korovina}, title = {Model checking Timed {CSP}}, booktitle = {{HOWARD-60:} {A} Festschrift on the Occasion of Howard Barringer's 60th Birthday}, series = {EPiC Series in Computing}, volume = {42}, pages = {13--33}, publisher = {EasyChair}, year = {2014}, url = {https://doi.org/10.29007/6fqk}, doi = {10.29007/6FQK}, timestamp = {Sun, 15 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ArmstrongLOR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1201-1716, author = {Tomasz Mazur and Gavin Lowe}, title = {A type reduction theory for systems with replicated components}, journal = {Log. Methods Comput. Sci.}, volume = {8}, number = {1}, year = {2012}, url = {https://doi.org/10.2168/LMCS-8(1:4)2012}, doi = {10.2168/LMCS-8(1:4)2012}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1201-1716.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ArmandoL12, author = {Alessandro Armando and Gavin Lowe}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {20}, number = {1}, pages = {1}, year = {2012}, url = {https://doi.org/10.3233/JCS-2011-0438}, doi = {10.3233/JCS-2011-0438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ArmandoL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ArmstrongGLOPRW12, author = {Philip J. Armstrong and Michael Goldsmith and Gavin Lowe and Jo{\"{e}}l Ouaknine and Hristina Palikareva and A. W. Roscoe and James Worrell}, editor = {P. Madhusudan and Sanjit A. Seshia}, title = {Recent Developments in {FDR}}, booktitle = {Computer Aided Verification - 24th International Conference, {CAV} 2012, Berkeley, CA, USA, July 7-13, 2012 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7358}, pages = {699--704}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31424-7\_52}, doi = {10.1007/978-3-642-31424-7\_52}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ArmstrongGLOPRW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/BateL12, author = {Andrew Bate and Gavin Lowe}, editor = {Peter H. Welch and Frederick R. M. Barnes and Kevin Chalmers and Jan B{\ae}kgaard Pedersen and Adam T. Sampson}, title = {A Debugger for Communicating Scala Objects}, booktitle = {34th Communicating Process Architectures, {CPA} 2012, organised under the auspices of WoTUG, Dundee, Scotland, UK, August 26, 2012}, pages = {135--154}, publisher = {Open Channel Publishing Ltd.}, year = {2012}, url = {http://wotug.org/paperdb/show\_pap.php?f=1\&\#38;num=666}, timestamp = {Tue, 09 Feb 2021 08:32:30 +0100}, biburl = {https://dblp.org/rec/conf/wotug/BateL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KamilL11, author = {Allaa Kamil and Gavin Lowe}, title = {Analysing {TLS} in the strand spaces model}, journal = {J. Comput. Secur.}, volume = {19}, number = {5}, pages = {975--1025}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0429}, doi = {10.3233/JCS-2011-0429}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KamilL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/Gibson-RobinsonL11, author = {Thomas Gibson{-}Robinson and Gavin Lowe}, editor = {Gilles Barthe and Anupam Datta and Sandro Etalle}, title = {Analysing Applications Layered on Unilaterally Authenticating Protocols}, booktitle = {Formal Aspects of Security and Trust - 8th International Workshop, {FAST} 2011, Leuven, Belgium, September 12-14, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7140}, pages = {164--181}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29420-4\_11}, doi = {10.1007/978-3-642-29420-4\_11}, timestamp = {Sat, 19 Oct 2019 20:16:12 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/Gibson-RobinsonL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/Lowe11, author = {Gavin Lowe}, editor = {Peter H. Welch and Adam T. Sampson and Jan B{\ae}kgaard Pedersen and Jon M. Kerridge and Jan F. Broenink and Frederick R. M. Barnes}, title = {Implementing Generalised Alt - {A} Case Study in Validated Design using {CSP}}, booktitle = {33th Communicating Process Architectures Conference, {CPA} 2011, organised under the auspices of WoTUG, Limerick, Ireland, June 19th, 2011}, series = {Concurrent Systems Engineering Series}, volume = {68}, pages = {1--34}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-774-1-1}, doi = {10.3233/978-1-60750-774-1-1}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wotug/Lowe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ios/11/Lowe11, author = {Gavin Lowe}, editor = {V{\'{e}}ronique Cortier and Steve Kremer}, title = {Analysing Security Protocols using {CSP}}, booktitle = {Formal Models and Techniques for Analyzing Security Protocols}, series = {Cryptology and Information Security Series}, volume = {5}, pages = {62--85}, publisher = {{IOS} Press}, year = {2011}, url = {https://doi.org/10.3233/978-1-60750-714-7-62}, doi = {10.3233/978-1-60750-714-7-62}, timestamp = {Fri, 15 May 2020 12:11:04 +0200}, biburl = {https://dblp.org/rec/books/ios/11/Lowe11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip1-7/2010wits, editor = {Alessandro Armando and Gavin Lowe}, title = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-16074-5}, doi = {10.1007/978-3-642-16074-5}, isbn = {978-3-642-16073-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/2010wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KamilL10, author = {Allaa Kamil and Gavin Lowe}, editor = {Pierpaolo Degano and Sandro Etalle and Joshua D. Guttman}, title = {Understanding Abstractions of Secure Channels}, booktitle = {Formal Aspects of Security and Trust - 7th International Workshop, {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6561}, pages = {50--64}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-19751-2\_4}, doi = {10.1007/978-3-642-19751-2\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KamilL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-1011-6434, author = {Gavin Lowe}, editor = {Sibylle B. Fr{\"{o}}schle and Frank D. Valencia}, title = {Models for {CSP} with availability information}, booktitle = {Proceedings 17th International Workshop on Expressiveness in Concurrency, EXPRESS'10, Paris, France, August 30th, 2010}, series = {{EPTCS}}, volume = {41}, pages = {91--105}, year = {2010}, url = {https://doi.org/10.4204/EPTCS.41.7}, doi = {10.4204/EPTCS.41.7}, timestamp = {Wed, 12 Sep 2018 01:05:13 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1011-6434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/MurrayL09, author = {Toby C. Murray and Gavin Lowe}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Analysing the Information Flow Properties of Object-Capability Patterns}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {81--95}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_7}, doi = {10.1007/978-3-642-12459-4\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/MurrayL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/KamilL09, author = {Allaa Kamil and Gavin Lowe}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Specifying and Modelling Secure Channels in Strand Spaces}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {233--247}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_17}, doi = {10.1007/978-3-642-12459-4\_17}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/KamilL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wotug/Lowe09, author = {Gavin Lowe}, editor = {Peter H. Welch and Herman W. Roebbers and Jan F. Broenink and Fred R. M. Barnes and Carl G. Ritson and Adam T. Sampson and Gardiner S. Stiles and Brian Vinter}, title = {Extending {CSP} with Tests for Availability}, booktitle = {The thirty-second Communicating Process Architectures Conference, {CPA} 2009, organised under the auspices of WoTUG, Eindhoven, The Netherlands, 1-6 November 2009}, series = {Concurrent Systems Engineering Series}, volume = {67}, pages = {325--347}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-065-0-325}, doi = {10.3233/978-1-60750-065-0-325}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wotug/Lowe09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/Lowe08, author = {Gavin Lowe}, title = {Specification of communicating processes: temporal logic versus refusals-based refinement}, journal = {Formal Aspects Comput.}, volume = {20}, number = {3}, pages = {277--294}, year = {2008}, url = {https://doi.org/10.1007/s00165-007-0065-0}, doi = {10.1007/S00165-007-0065-0}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/Lowe08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DillowayL08, author = {Christopher Dilloway and Gavin Lowe}, title = {Specifying Secure Transport Channels}, booktitle = {Proceedings of the 21st {IEEE} Computer Security Foundations Symposium, {CSF} 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008}, pages = {210--223}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CSF.2008.14}, doi = {10.1109/CSF.2008.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DillowayL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MurrayL09, author = {Toby C. Murray and Gavin Lowe}, editor = {Alice Miller and Muffy Calder}, title = {On Refinement-Closed Security Properties and Nondeterministic Compositions}, booktitle = {Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems, AVoCS 2008, Glasgow, UK, September 30 - October 1, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {250}, number = {2}, pages = {49--68}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.08.017}, doi = {10.1016/J.ENTCS.2009.08.017}, timestamp = {Fri, 24 Feb 2023 13:53:27 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MurrayL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/Lowe09, author = {Gavin Lowe}, editor = {Michael Goldsmith and Bill Roscoe}, title = {On {CSP} Refinement Tests That Run Multiple Copies of a Process}, booktitle = {Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {250}, number = {1}, pages = {153--170}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2009.08.011}, doi = {10.1016/J.ENTCS.2009.08.011}, timestamp = {Fri, 24 Feb 2023 13:48:46 +0100}, biburl = {https://dblp.org/rec/journals/entcs/Lowe09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MazurL09, author = {Tomasz Mazur and Gavin Lowe}, editor = {Michael Goldsmith and Bill Roscoe}, title = {Counter Abstraction in the {CSP/FDR} setting}, booktitle = {Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, AVoCS 2007, Oxford, UK, September 10-12, 2007}, series = {Electronic Notes in Theoretical Computer Science}, volume = {250}, number = {1}, pages = {171--186}, publisher = {Elsevier}, year = {2007}, url = {https://doi.org/10.1016/j.entcs.2009.08.012}, doi = {10.1016/J.ENTCS.2009.08.012}, timestamp = {Fri, 24 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MazurL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BoltonL05, author = {Christie Bolton and Gavin Lowe}, title = {A hierarchy of failures-based models: theory and application}, journal = {Theor. Comput. Sci.}, volume = {330}, number = {3}, pages = {407--438}, year = {2005}, url = {https://doi.org/10.1016/j.tcs.2004.10.004}, doi = {10.1016/J.TCS.2004.10.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BoltonL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/RohrmairL05, author = {Gordon Thomas Rohrmair and Gavin Lowe}, title = {Using data-independence in the analysis of intrusion detection systems}, journal = {Theor. Comput. Sci.}, volume = {340}, number = {1}, pages = {82--101}, year = {2005}, url = {https://doi.org/10.1016/j.tcs.2005.03.004}, doi = {10.1016/J.TCS.2005.03.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/RohrmairL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LoweO06, author = {Gavin Lowe and Jo{\"{e}}l Ouaknine}, editor = {Mart{\'{\i}}n H{\"{o}}tzel Escard{\'{o}} and Achim Jung and Michael W. Mislove}, title = {On Timed Models and Full Abstraction}, booktitle = {Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, {MFPS} 2005, Birmingham, UK, May 18-21, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {155}, pages = {497--519}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.11.070}, doi = {10.1016/J.ENTCS.2005.11.070}, timestamp = {Mon, 08 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/LoweO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HopcroftL04, author = {Philippa J. Hopcroft and Gavin Lowe}, title = {Analysing a stream authentication protocol using model checking}, journal = {Int. J. Inf. Sec.}, volume = {3}, number = {1}, pages = {2--13}, year = {2004}, url = {https://doi.org/10.1007/s10207-004-0040-1}, doi = {10.1007/S10207-004-0040-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/HopcroftL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lowe04, author = {Gavin Lowe}, title = {Analysing Protocol Subject to Guessing Attacks}, journal = {J. Comput. Secur.}, volume = {12}, number = {1}, pages = {83--98}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12104}, doi = {10.3233/JCS-2004-12104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lowe04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lowe04a, author = {Gavin Lowe}, title = {Defining information flow quantity}, journal = {J. Comput. Secur.}, volume = {12}, number = {3-4}, pages = {619--653}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-123-410}, doi = {10.3233/JCS-2004-123-410}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lowe04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Lowe04, author = {Gavin Lowe}, title = {Semantic models for information flow}, journal = {Theor. Comput. Sci.}, volume = {315}, number = {1}, pages = {209--256}, year = {2004}, url = {https://doi.org/10.1016/j.tcs.2003.11.019}, doi = {10.1016/J.TCS.2003.11.019}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Lowe04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/BoltonL04, author = {Christie Bolton and Gavin Lowe}, title = {Analyses of the Reverse Path Forwarding Routing Algorithm}, booktitle = {2004 International Conference on Dependable Systems and Networks {(DSN} 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings}, pages = {485--494}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/DSN.2004.1311918}, doi = {10.1109/DSN.2004.1311918}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/BoltonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HeatherLS03, author = {James Heather and Gavin Lowe and Steve A. Schneider}, title = {How to Prevent Type Flaw Attacks on Security Protocols}, journal = {J. Comput. Secur.}, volume = {11}, number = {2}, pages = {217--244}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11204}, doi = {10.3233/JCS-2003-11204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HeatherLS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BroadfootL03, author = {Philippa J. Broadfoot and Gavin Lowe}, title = {On Distributed Security Transactions that Use Secure Transport Protocols}, booktitle = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003), 30 June - 2 July 2003, Pacific Grove, CA, {USA}}, pages = {141}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSFW.2003.1212710}, doi = {10.1109/CSFW.2003.1212710}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BroadfootL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwfm/BoltonL03, author = {Christie Bolton and Gavin Lowe}, editor = {Joseph M. Morris and Benjamin Aziz and Fr{\'{e}}d{\'{e}}ric Oehl}, title = {On the Automatic Verification of Non-Standard Measures of Consistency}, booktitle = {6th International Workshop on Formal Methods, {IWFM} 2003, Dublin City University, Ireland, 11 July, 2003}, series = {Workshops in Computing}, publisher = {{BCS}}, year = {2003}, url = {http://ewic.bcs.org/content/ConWebDoc/4024}, timestamp = {Tue, 19 Jun 2018 08:05:11 +0200}, biburl = {https://dblp.org/rec/conf/iwfm/BoltonL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BoltonL04, author = {Christie Bolton and Gavin Lowe}, editor = {Flavio Corradini and Uwe Nestmann}, title = {A Hierarchy of Failures-Based Models}, booktitle = {Proceedings of the 10th International Workshop on Expressiveness in Concurrency, {EXPRESS} 2003, Marseille, France, September 2, 2003}, series = {Electronic Notes in Theoretical Computer Science}, volume = {96}, pages = {129--152}, publisher = {Elsevier}, year = {2003}, url = {https://doi.org/10.1016/j.entcs.2004.04.025}, doi = {10.1016/J.ENTCS.2004.04.025}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BoltonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-DC-0306004, author = {Roberto Alfieri and Roberto Cecchini and Vincenzo Ciaschini and Luca dell'Agnello and Alberto Gianoli and Fabio Spataro and Franck Bonnassieux and Philippa J. Broadfoot and Gavin Lowe and Linda Cornwall and Jens Jensen and David P. Kelsey and {\'{A}}kos Frohner and David L. Groep and Wim Som de Cerff and Martijn Steenbakkers and Gerben Venekamp and Daniel Kouril and Andrew McNab and Olle Mulmo and Mika Silander and Joni Hahkala and K{\'{a}}roly L{\"{o}}rentey}, title = {Managing Dynamic User Communities in a Grid of Autonomous Resources}, journal = {CoRR}, volume = {cs.DC/0306004}, year = {2003}, url = {http://arxiv.org/abs/cs/0306004}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-DC-0306004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe02, author = {Gavin Lowe}, title = {Quantifying Information Flow}, booktitle = {15th {IEEE} Computer Security Foundations Workshop {(CSFW-15} 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada}, pages = {18--31}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2002.1021804}, doi = {10.1109/CSFW.2002.1021804}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BroadfootL02, author = {Philippa J. Broadfoot and Gavin Lowe}, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Analysing a Stream Authentication Protocol Using Model Checking}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, pages = {146--161}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0\_9}, doi = {10.1007/3-540-45853-0\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BroadfootL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fasec/RohrmairL02, author = {Gordon Thomas Rohrmair and Gavin Lowe}, editor = {Ali E. Abdallah and Peter Y. A. Ryan and Steve A. Schneider}, title = {Using {CSP} to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area}, booktitle = {Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2629}, pages = {205--220}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-3-540-40981-6\_17}, doi = {10.1007/978-3-540-40981-6\_17}, timestamp = {Wed, 15 Sep 2021 13:43:48 +0200}, biburl = {https://dblp.org/rec/conf/fasec/RohrmairL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HuiL01, author = {Mei Lin Hui and Gavin Lowe}, title = {Fault-Preserving Simplifying Transformations for Security Protocols}, journal = {J. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {3--46}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-91-202}, doi = {10.3233/JCS-2001-91-202}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HuiL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HeatherLS00, author = {James Heather and Gavin Lowe and Steve A. Schneider}, title = {How to Prevent Type Flaw Attacks on Security Protocols}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {255--268}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856942}, doi = {10.1109/CSFW.2000.856942}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HeatherLS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BroadfootLR00, author = {Philippa J. Broadfoot and Gavin Lowe and A. W. Roscoe}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Yves Deswarte and Dieter Gollmann and Michael Waidner}, title = {Automating Data Independence}, booktitle = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1895}, pages = {175--190}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722599\_11}, doi = {10.1007/10722599\_11}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BroadfootLR00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/RoscoeBL00, author = {A. W. Roscoe and Philippa J. Broadfoot and Gavin Lowe}, editor = {Ted Hurley and M{\'{\i}}che{\'{a}}l Mac an Airchinnigh and Michel P. Schellekens and Anthony Karel Seda}, title = {Data independent verification of crypto-protocols}, booktitle = {First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, {MFCSIT} 2000, Cork, Ireland, July 20-21, 2000}, series = {Electronic Notes in Theoretical Computer Science}, volume = {40}, pages = {359}, publisher = {Elsevier}, year = {2000}, url = {https://doi.org/10.1016/S1571-0661(05)80062-3}, doi = {10.1016/S1571-0661(05)80062-3}, timestamp = {Wed, 30 Nov 2022 10:58:03 +0100}, biburl = {https://dblp.org/rec/journals/entcs/RoscoeBL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dc/LoweD99, author = {Gavin Lowe and Jim Davies}, title = {Using {CSP} to Verify Sequential Consistency}, journal = {Distributed Comput.}, volume = {12}, number = {2-3}, pages = {91--103}, year = {1999}, url = {https://doi.org/10.1007/s004460050060}, doi = {10.1007/S004460050060}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dc/LoweD99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lowe99, author = {Gavin Lowe}, title = {Towards a Completeness Result for Model Checking of Security Protocols}, journal = {J. Comput. Secur.}, volume = {7}, number = {1}, pages = {89--146}, year = {1999}, url = {https://doi.org/10.3233/jcs-1999-72-302}, doi = {10.3233/JCS-1999-72-302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lowe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe99, author = {Mei Lin Hui and Gavin Lowe}, title = {Safe Simplifying Transformations for Security Protocols}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {32--43}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779760}, doi = {10.1109/CSFW.1999.779760}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Lowe98, author = {Gavin Lowe}, title = {Casper: {A} Compiler for the Analysis of Security Protocols}, journal = {J. Comput. Secur.}, volume = {6}, number = {1-2}, pages = {53--84}, year = {1998}, url = {https://doi.org/10.3233/jcs-1998-61-204}, doi = {10.3233/JCS-1998-61-204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Lowe98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GorrieriSAFGLM98, author = {Roberto Gorrieri and Paul F. Syverson and Mart{\'{\i}}n Abadi and Riccardo Focardi and Dieter Gollmann and Gavin Lowe and Catherine Meadows}, title = {Panel Introduction: Varieties of Authentication}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {79--82}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.1998.10000}, doi = {10.1109/CSFW.1998.10000}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GorrieriSAFGLM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe98, author = {Gavin Lowe}, title = {Towards a Completeness Result for Model Checking of Security Protocols}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {96--105}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683159}, doi = {10.1109/CSFW.1998.683159}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/LoweR97, author = {Gavin Lowe and A. W. Roscoe}, title = {Using {CSP} to Detect Errors in the {TMN} Protocol}, journal = {{IEEE} Trans. Software Eng.}, volume = {23}, number = {10}, pages = {659--669}, year = {1997}, url = {https://doi.org/10.1109/32.637148}, doi = {10.1109/32.637148}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/LoweR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe97, author = {Gavin Lowe}, title = {Casper: {A} Compiler for the Analysis of Security Protocols}, booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12, 1997, Rockport, Massachusetts, {USA}}, pages = {18--30}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSFW.1997.596779}, doi = {10.1109/CSFW.1997.596779}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe97a, author = {Gavin Lowe}, title = {A Hierarchy of Authentication Specification}, booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12, 1997, Rockport, Massachusetts, {USA}}, pages = {31--44}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSFW.1997.596782}, doi = {10.1109/CSFW.1997.596782}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/CurtisL96, author = {Sharon Curtis and Gavin Lowe}, title = {Proofs with Graphs}, journal = {Sci. Comput. Program.}, volume = {26}, number = {1-3}, pages = {197--216}, year = {1996}, url = {https://doi.org/10.1016/0167-6423(95)00025-9}, doi = {10.1016/0167-6423(95)00025-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/CurtisL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/stp/Lowe96, author = {Gavin Lowe}, title = {Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using {FDR}}, journal = {Softw. Concepts Tools}, volume = {17}, number = {3}, pages = {93--102}, year = {1996}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/stp/Lowe96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Lowe96, author = {Gavin Lowe}, title = {Some new attacks upon security protocols}, booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}, pages = {162--169}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSFW.1996.503701}, doi = {10.1109/CSFW.1996.503701}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Lowe96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tacas/Lowe96, author = {Gavin Lowe}, editor = {Tiziana Margaria and Bernhard Steffen}, title = {Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using {FDR}}, booktitle = {Tools and Algorithms for Construction and Analysis of Systems, Second International Workshop, {TACAS} '96, Passau, Germany, March 27-29, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1055}, pages = {147--166}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61042-1\_43}, doi = {10.1007/3-540-61042-1\_43}, timestamp = {Sun, 02 Jun 2019 21:19:27 +0200}, biburl = {https://dblp.org/rec/conf/tacas/Lowe96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Lowe95, author = {Gavin Lowe}, title = {Scheduling-Oriented Models for Real-Time Systems}, journal = {Comput. J.}, volume = {38}, number = {6}, pages = {443--456}, year = {1995}, url = {https://doi.org/10.1093/comjnl/38.6.443}, doi = {10.1093/COMJNL/38.6.443}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Lowe95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LoweZ95, author = {Gavin Lowe and Hussein Zedan}, title = {Refinement of Complex Systems: {A} Case Study}, journal = {Comput. J.}, volume = {38}, number = {10}, pages = {785--800}, year = {1995}, url = {https://doi.org/10.1093/comjnl/38.10.785}, doi = {10.1093/COMJNL/38.10.785}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/LoweZ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Lowe95, author = {Gavin Lowe}, title = {An Attack on the Needham-Schroeder Public-Key Authentication Protocol}, journal = {Inf. Process. Lett.}, volume = {56}, number = {3}, pages = {131--133}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)00144-2}, doi = {10.1016/0020-0190(95)00144-2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/Lowe95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/Lowe95, author = {Gavin Lowe}, title = {Probabilistic and Prioritized Models of Timed {CSP}}, journal = {Theor. Comput. Sci.}, volume = {138}, number = {2}, pages = {315--352}, year = {1995}, url = {https://doi.org/10.1016/0304-3975(94)00171-E}, doi = {10.1016/0304-3975(94)00171-E}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/Lowe95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mpc/CurtisL95, author = {Sharon Curtis and Gavin Lowe}, editor = {Bernhard M{\"{o}}ller}, title = {A Graphical Calculus}, booktitle = {Mathematics of Program Construction, MPC'95, Kloster Irsee, Germany, July 17-21, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {947}, pages = {214--231}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60117-1\_12}, doi = {10.1007/3-540-60117-1\_12}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/mpc/CurtisL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Lowe93, author = {Gavin Lowe}, title = {Probabilities and priorities in timed {CSP}}, school = {University of Oxford, {UK}}, year = {1993}, url = {http://ora.ox.ac.uk/objects/uuid:cfec28d9-aa50-46f3-a664-eb5fbe97b261}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Lowe93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.