dblp.uni-trier.dewww.uni-trier.de

Gavin Lowe

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
40EEChristopher Dilloway, Gavin Lowe: Specifying Secure Transport Channels. CSF 2008: 210-223
39EEGavin Lowe: Specification of communicating processes: temporal logic versus refusals-based refinement. Formal Asp. Comput. 20(3): 277-294 (2008)
2006
38EEGavin Lowe, Joël Ouaknine: On Timed Models and Full Abstraction. Electr. Notes Theor. Comput. Sci. 155: 497-519 (2006)
2005
37EEChristie Bolton, Gavin Lowe: A hierarchy of failures-based models: theory and application. Theor. Comput. Sci. 330(3): 407-438 (2005)
36EEGordon Thomas Rohrmair, Gavin Lowe: Using data-independence in the analysis of intrusion detection systems. Theor. Comput. Sci. 340(1): 82-101 (2005)
2004
35EEChristie Bolton, Gavin Lowe: Analyses of the Reverse Path Forwarding Routing Algorithm. DSN 2004: 485-494
34EEChristie Bolton, Gavin Lowe: A Hierarchy of Failures-Based Models. Electr. Notes Theor. Comput. Sci. 96: 129-152 (2004)
33EEPhilippa J. Hopcroft, Gavin Lowe: Analysing a stream authentication protocol using model checking. Int. J. Inf. Sec. 3(1): 2-13 (2004)
32 Gavin Lowe: Analysing Protocol Subject to Guessing Attacks. Journal of Computer Security 12(1): 83-98 (2004)
31 Gavin Lowe: Defining information flow quantity. Journal of Computer Security 12(3-4): 619-653 (2004)
30EEGavin Lowe: Semantic models for information flow. Theor. Comput. Sci. 315(1): 209-256 (2004)
2003
29EEPhilippa J. Broadfoot, Gavin Lowe: On Distributed Security Transactions that Use Secure Transport Protocols. CSFW 2003: 141-
28EEChristie Bolton, Gavin Lowe: On the Automatic Verification of Non-Standard Measures of Consistency. IWFM 2003
27EERoberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey: Managing Dynamic User Communities in a Grid of Autonomous Resources CoRR cs.DC/0306004: (2003)
26 James Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security 11(2): 217-244 (2003)
2002
25EEGavin Lowe: Quantifying Information Flow. CSFW 2002: 18-31
24EEPhilippa J. Broadfoot, Gavin Lowe: Analysing a Stream Authentication Protocol Using Model Checking. ESORICS 2002: 146-161
23EEGordon Thomas Rohrmair, Gavin Lowe: Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. FASec 2002: 205-220
2001
22 Mei Lin Hui, Gavin Lowe: Fault-Preserving Simplifying Transformations for Security Protocols. Journal of Computer Security 9(1/2): 3-46 (2001)
2000
21EEJames Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268
20EEPhilippa J. Broadfoot, Gavin Lowe, A. W. Roscoe: Automating Data Independence. ESORICS 2000: 175-190
19EEA. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe: Data independent verification of crypto-protocols. Electr. Notes Theor. Comput. Sci. 40: (2000)
1999
18EEMei Lin Hui, Gavin Lowe: Safe Simplifying Transformations for Security Protocols. CSFW 1999: 32-43
17EEGavin Lowe, Jim Davies: Using CSP to Verify Sequential Consistency. Distributed Computing 12(2-3): 91-103 (1999)
16 Gavin Lowe: Towards a Completeness Result for Model Checking of Security Protocols. Journal of Computer Security 7(1): (1999)
1998
15EERoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
14EEGavin Lowe: Towards a Completeness Result for Model Checking of Security Protocols. CSFW 1998: 96-105
13 Gavin Lowe: Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security 6(1-2): 53-84 (1998)
1997
12EEGavin Lowe: Casper: A Compiler for the Analysis of Security Protocols. CSFW 1997: 18-30
11EEGavin Lowe: A Hierarchy of Authentication Specification. CSFW 1997: 31-44
10EEGavin Lowe, A. W. Roscoe: Using CSP to Detect Errors in the TMN Protocol. IEEE Trans. Software Eng. 23(10): 659-669 (1997)
1996
9EEGavin Lowe: Some new attacks upon security protocols. CSFW 1996: 162-169
8 Gavin Lowe: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. TACAS 1996: 147-166
7 Sharon Curtis, Gavin Lowe: Proofs with Graphs. Sci. Comput. Program. 26(1-3): 197-216 (1996)
6 Gavin Lowe: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. Software - Concepts and Tools 17(3): 93-102 (1996)
1995
5 Sharon Curtis, Gavin Lowe: A Graphical Calculus. MPC 1995: 214-231
4 Gavin Lowe, Hussein Zedan: Refinement of Complex Systems: A Case Study. Comput. J. 38(10): 785-800 (1995)
3 Gavin Lowe: Scheduling-Oriented Models for Real-Time Systems. Comput. J. 38(6): 443-456 (1995)
2EEGavin Lowe: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Inf. Process. Lett. 56(3): 131-133 (1995)
1EEGavin Lowe: Probabilistic and Prioritized Models of Timed CSP. Theor. Comput. Sci. 138(2): 315-352 (1995)

Coauthor Index

1Martín Abadi [15]
2Roberto Alfieri [27]
3Franck Bonnassieux [27]
4Roberto Cecchini [27]
5Wim Som de Cerff [27]
6Vincenzo Ciaschini [27]
7Linda Cornwall [27]
8Sharon Curtis [5] [7]
9Jim Davies [17]
10Christopher Dilloway [40]
11Riccardo Focardi [15]
12Ákos Frohner [27]
13Alberto Gianoli [27]
14Dieter Gollmann [15]
15Roberto Gorrieri [15]
16David L. Groep [27]
17Joni Hahkala [27]
18James Heather [21] [26]
19Philippa J. Hopcroft (Philippa J. Broadfoot) [19] [20] [24] [27] [29] [33]
20Mei Lin Hui [18] [22]
21Jens Jensen [27]
22David P. Kelsey [27]
23Daniel Kouril [27]
24Károly Lörentey [27]
25Christie Marr (Christie Bolton) [28] [34] [35] [37]
26Andrew McNab [27]
27Catherine Meadows [15]
28Olle Mulmo [27]
29Joël Ouaknine [38]
30Gordon Thomas Rohrmair [23] [36]
31A. W. Roscoe (A. William Roscoe, Bill Roscoe) [10] [19] [20]
32Steve A. Schneider (Steve Schneider) [21] [26]
33Mika Silander [27]
34Fabio Spataro [27]
35Martijn Steenbakkers [27]
36Paul F. Syverson [15]
37Gerben Venekamp [27]
38Hussein Zedan (Hussein S. M. Zedan) [4]
39Luca dell'Agnello [27]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)