Gavin Lowe

Affiliations:
  • University of Oxford, UK


According to our database1, Gavin Lowe authored at least 65 papers between 1993 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Parameterized verification of systems with component identities, using view abstraction.
Int. J. Softw. Tools Technol. Transf., 2022

2019
Symmetry reduction in CSP model checking.
Int. J. Softw. Tools Technol. Transf., 2019

Discovering and correcting a deadlock in a channel implementation.
Formal Aspects Comput., 2019

2018
Lock-free concurrent binomial heaps.
J. Log. Algebraic Methods Program., 2018

View Abstraction for Systems with Component Identities.
Proceedings of the Formal Methods - 22nd International Symposium, 2018

2017
Testing for linearizability.
Concurr. Comput. Pract. Exp., 2017

Analysing Lock-Free Linearizable Datatypes Using CSP.
Proceedings of the Concurrency, Security, and Puzzles, 2017

FDR: From Theory to Industrial Application.
Proceedings of the Concurrency, Security, and Puzzles, 2017

2016
Concurrent depth-first search algorithms based on Tarjan's Algorithm.
Int. J. Softw. Tools Technol. Transf., 2016

Models for CSP with availability information.
Math. Struct. Comput. Sci., 2016

2015
Verifying layered security protocols.
J. Comput. Secur., 2015

2014
CSP-based counter abstraction for systems with node identifiers.
Sci. Comput. Program., 2014

Concurrent Depth-First Search Algorithms.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2014

Model checking Timed CSP.
Proceedings of the HOWARD-60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday, 2014

2012
Preface.
J. Comput. Secur., 2012

A type reduction theory for systems with replicated components
Log. Methods Comput. Sci., 2012

A Debugger for Communicating Scala Objects.
Proceedings of the 34th Communicating Process Architectures, 2012

Recent Developments in FDR.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

2011
Analysing TLS in the strand spaces model.
J. Comput. Secur., 2011

Implementing Generalised Alt - A Case Study in Validated Design using CSP.
Proceedings of the 33th Communicating Process Architectures Conference, 2011

Analysing Applications Layered on Unilaterally Authenticating Protocols.
Proceedings of the Formal Aspects of Security and Trust - 8th International Workshop, 2011

Analysing Security Protocols using CSP.
Proceedings of the Formal Models and Techniques for Analyzing Security Protocols, 2011

2010
Understanding Abstractions of Secure Channels.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

2009
Extending CSP with Tests for Availability.
Proceedings of the thirty-second Communicating Process Architectures Conference, 2009

Analysing the Information Flow Properties of Object-Capability Patterns.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

Specifying and Modelling Secure Channels in Strand Spaces.
Proceedings of the Formal Aspects in Security and Trust, 6th International Workshop, 2009

2008
Specification of communicating processes: temporal logic versus refusals-based refinement.
Formal Aspects Comput., 2008

On Refinement-Closed Security Properties and Nondeterministic Compositions.
Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems, 2008

Specifying Secure Transport Channels.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

2007
Counter Abstraction in the CSP/FDR setting.
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007

On CSP Refinement Tests That Run Multiple Copies of a Process.
Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems, 2007

2005
Using data-independence in the analysis of intrusion detection systems.
Theor. Comput. Sci., 2005

A hierarchy of failures-based models: theory and application.
Theor. Comput. Sci., 2005

On Timed Models and Full Abstraction.
Proceedings of the 21st Annual Conference on Mathematical Foundations of Programming Semantics, 2005

2004
Semantic models for information flow.
Theor. Comput. Sci., 2004

Defining information flow quantity.
J. Comput. Secur., 2004

Analysing Protocol Subject to Guessing Attacks.
J. Comput. Secur., 2004

Analysing a stream authentication protocol using model checking.
Int. J. Inf. Sec., 2004

Analyses of the Reverse Path Forwarding Routing Algorithm.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
How to Prevent Type Flaw Attacks on Security Protocols.
J. Comput. Secur., 2003

A Hierarchy of Failures-Based Models.
Proceedings of the 10th International Workshop on Expressiveness in Concurrency, 2003

Managing Dynamic User Communities in a Grid of Autonomous Resources
CoRR, 2003

On the Automatic Verification of Non-Standard Measures of Consistency.
Proceedings of the 6th International Workshop on Formal Methods, 2003

On Distributed Security Transactions that Use Secure Transport Protocols.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

2002
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area.
Proceedings of the Formal Aspects of Security, First International Conference, 2002

Quantifying Information Flow.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Fault-Preserving Simplifying Transformations for Security Protocols.
J. Comput. Secur., 2001

2000
Data independent verification of crypto-protocols.
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000

Automating Data Independence.
Proceedings of the Computer Security, 2000

1999
Towards a Completeness Result for Model Checking of Security Protocols.
J. Comput. Secur., 1999

Using CSP to Verify Sequential Consistency.
Distributed Comput., 1999

Safe Simplifying Transformations for Security Protocols.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Casper: A Compiler for the Analysis of Security Protocols.
J. Comput. Secur., 1998

Panel Introduction: Varieties of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Using CSP to Detect Errors in the TMN Protocol.
IEEE Trans. Software Eng., 1997

A Hierarchy of Authentication Specification.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR.
Softw. Concepts Tools, 1996

Proofs with Graphs.
Sci. Comput. Program., 1996

Some new attacks upon security protocols.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1995
Probabilistic and Prioritized Models of Timed CSP.
Theor. Comput. Sci., 1995

An Attack on the Needham-Schroeder Public-Key Authentication Protocol.
Inf. Process. Lett., 1995

Refinement of Complex Systems: A Case Study.
Comput. J., 1995

Scheduling-Oriented Models for Real-Time Systems.
Comput. J., 1995

A Graphical Calculus.
Proceedings of the Mathematics of Program Construction, 1995

1993
Probabilities and priorities in timed CSP.
PhD thesis, 1993


  Loading...