2008 | ||
---|---|---|
40 | EE | Christopher Dilloway, Gavin Lowe: Specifying Secure Transport Channels. CSF 2008: 210-223 |
39 | EE | Gavin Lowe: Specification of communicating processes: temporal logic versus refusals-based refinement. Formal Asp. Comput. 20(3): 277-294 (2008) |
2006 | ||
38 | EE | Gavin Lowe, Joël Ouaknine: On Timed Models and Full Abstraction. Electr. Notes Theor. Comput. Sci. 155: 497-519 (2006) |
2005 | ||
37 | EE | Christie Bolton, Gavin Lowe: A hierarchy of failures-based models: theory and application. Theor. Comput. Sci. 330(3): 407-438 (2005) |
36 | EE | Gordon Thomas Rohrmair, Gavin Lowe: Using data-independence in the analysis of intrusion detection systems. Theor. Comput. Sci. 340(1): 82-101 (2005) |
2004 | ||
35 | EE | Christie Bolton, Gavin Lowe: Analyses of the Reverse Path Forwarding Routing Algorithm. DSN 2004: 485-494 |
34 | EE | Christie Bolton, Gavin Lowe: A Hierarchy of Failures-Based Models. Electr. Notes Theor. Comput. Sci. 96: 129-152 (2004) |
33 | EE | Philippa J. Hopcroft, Gavin Lowe: Analysing a stream authentication protocol using model checking. Int. J. Inf. Sec. 3(1): 2-13 (2004) |
32 | Gavin Lowe: Analysing Protocol Subject to Guessing Attacks. Journal of Computer Security 12(1): 83-98 (2004) | |
31 | Gavin Lowe: Defining information flow quantity. Journal of Computer Security 12(3-4): 619-653 (2004) | |
30 | EE | Gavin Lowe: Semantic models for information flow. Theor. Comput. Sci. 315(1): 209-256 (2004) |
2003 | ||
29 | EE | Philippa J. Broadfoot, Gavin Lowe: On Distributed Security Transactions that Use Secure Transport Protocols. CSFW 2003: 141- |
28 | EE | Christie Bolton, Gavin Lowe: On the Automatic Verification of Non-Standard Measures of Consistency. IWFM 2003 |
27 | EE | Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Alberto Gianoli, Fabio Spataro, Franck Bonnassieux, Philippa J. Broadfoot, Gavin Lowe, Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, David L. Groep, Wim Som de Cerff, Martijn Steenbakkers, Gerben Venekamp, Daniel Kouril, Andrew McNab, Olle Mulmo, Mika Silander, Joni Hahkala, Károly Lörentey: Managing Dynamic User Communities in a Grid of Autonomous Resources CoRR cs.DC/0306004: (2003) |
26 | James Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security 11(2): 217-244 (2003) | |
2002 | ||
25 | EE | Gavin Lowe: Quantifying Information Flow. CSFW 2002: 18-31 |
24 | EE | Philippa J. Broadfoot, Gavin Lowe: Analysing a Stream Authentication Protocol Using Model Checking. ESORICS 2002: 146-161 |
23 | EE | Gordon Thomas Rohrmair, Gavin Lowe: Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. FASec 2002: 205-220 |
2001 | ||
22 | Mei Lin Hui, Gavin Lowe: Fault-Preserving Simplifying Transformations for Security Protocols. Journal of Computer Security 9(1/2): 3-46 (2001) | |
2000 | ||
21 | EE | James Heather, Gavin Lowe, Steve Schneider: How to Prevent Type Flaw Attacks on Security Protocols. CSFW 2000: 255-268 |
20 | EE | Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe: Automating Data Independence. ESORICS 2000: 175-190 |
19 | EE | A. W. Roscoe, Philippa J. Broadfoot, Gavin Lowe: Data independent verification of crypto-protocols. Electr. Notes Theor. Comput. Sci. 40: (2000) |
1999 | ||
18 | EE | Mei Lin Hui, Gavin Lowe: Safe Simplifying Transformations for Security Protocols. CSFW 1999: 32-43 |
17 | EE | Gavin Lowe, Jim Davies: Using CSP to Verify Sequential Consistency. Distributed Computing 12(2-3): 91-103 (1999) |
16 | Gavin Lowe: Towards a Completeness Result for Model Checking of Security Protocols. Journal of Computer Security 7(1): (1999) | |
1998 | ||
15 | EE | Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 |
14 | EE | Gavin Lowe: Towards a Completeness Result for Model Checking of Security Protocols. CSFW 1998: 96-105 |
13 | Gavin Lowe: Casper: A Compiler for the Analysis of Security Protocols. Journal of Computer Security 6(1-2): 53-84 (1998) | |
1997 | ||
12 | EE | Gavin Lowe: Casper: A Compiler for the Analysis of Security Protocols. CSFW 1997: 18-30 |
11 | EE | Gavin Lowe: A Hierarchy of Authentication Specification. CSFW 1997: 31-44 |
10 | EE | Gavin Lowe, A. W. Roscoe: Using CSP to Detect Errors in the TMN Protocol. IEEE Trans. Software Eng. 23(10): 659-669 (1997) |
1996 | ||
9 | EE | Gavin Lowe: Some new attacks upon security protocols. CSFW 1996: 162-169 |
8 | Gavin Lowe: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. TACAS 1996: 147-166 | |
7 | Sharon Curtis, Gavin Lowe: Proofs with Graphs. Sci. Comput. Program. 26(1-3): 197-216 (1996) | |
6 | Gavin Lowe: Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR. Software - Concepts and Tools 17(3): 93-102 (1996) | |
1995 | ||
5 | Sharon Curtis, Gavin Lowe: A Graphical Calculus. MPC 1995: 214-231 | |
4 | Gavin Lowe, Hussein Zedan: Refinement of Complex Systems: A Case Study. Comput. J. 38(10): 785-800 (1995) | |
3 | Gavin Lowe: Scheduling-Oriented Models for Real-Time Systems. Comput. J. 38(6): 443-456 (1995) | |
2 | EE | Gavin Lowe: An Attack on the Needham-Schroeder Public-Key Authentication Protocol. Inf. Process. Lett. 56(3): 131-133 (1995) |
1 | EE | Gavin Lowe: Probabilistic and Prioritized Models of Timed CSP. Theor. Comput. Sci. 138(2): 315-352 (1995) |