Gavin Lowe : Publications
-
[1]
A Computational Justification for Guessing Attack Formalisms
Tom Newcomb and Gavin Lowe
In Proceedings of the Workshop on Issues in the Theory of Security (WITS '06). 2006.
Details about A Computational Justification for Guessing Attack Formalisms | BibTeX data for A Computational Justification for Guessing Attack Formalisms | Download (pdf) of A Computational Justification for Guessing Attack Formalisms
-
[2]
A Family of Attacks upon Authentication Protocols
Gavin Lowe
No. 1997/5. Department of Mathematics and Computer Science‚ University of Leicester. 1997.
Details about A Family of Attacks upon Authentication Protocols | BibTeX data for A Family of Attacks upon Authentication Protocols | Link to A Family of Attacks upon Authentication Protocols
-
[3]
A Graphical Calculus
Sharon Curtis and Gavin Lowe
In Mathematics of Program Construction. Vol. 947. Lecture Notes in Computer Science. 1995.
Details about A Graphical Calculus | BibTeX data for A Graphical Calculus | Link to A Graphical Calculus
-
[4]
A Hierarchy of Authentication Specification
Gavin Lowe
In 10th Computer Security Foundations Workshop (CSFW '97)‚ June 10−12‚ 1997‚ Rockport‚ Massachusetts‚ USA. Pages 31−44. IEEE Computer Society. 1997.
Details about A Hierarchy of Authentication Specification | BibTeX data for A Hierarchy of Authentication Specification | Link to A Hierarchy of Authentication Specification
-
[5]
A Hierarchy of Failures−Based Models
Christie Bolton and Gavin Lowe
In Electr. Notes Theor. Comput. Sci.. Vol. 96. Pages 129−152. 2004.
Details about A Hierarchy of Failures−Based Models | BibTeX data for A Hierarchy of Failures−Based Models | DOI (10.1016/j.entcs.2004.04.025)
-
[6]
A computational justification for guessing attack formalisms
Tom Newcomb and Gavin Lowe
No. RR−05−05. Oxford University Computing Laboratory. October, 2005.
Details about A computational justification for guessing attack formalisms | BibTeX data for A computational justification for guessing attack formalisms | Download (pdf) of A computational justification for guessing attack formalisms
-
[7]
A hierarchy of failures−based models: theory and application
Christie Bolton and Gavin Lowe
In Theoretical Computer Science. Vol. 330. No. 3. Pages 407−438. 2005.
Details about A hierarchy of failures−based models: theory and application | BibTeX data for A hierarchy of failures−based models: theory and application | DOI (10.1016/j.tcs.2004.10.004) | Link to A hierarchy of failures−based models: theory and application
-
[8]
A type reduction theory for systems with replicated components
Tomasz Mazur and Gavin Lowe
In Logical Methods in Computer Science. 2012.
Details about A type reduction theory for systems with replicated components | BibTeX data for A type reduction theory for systems with replicated components | Download (pdf) of A type reduction theory for systems with replicated components
-
[9]
An Attack on the Needham−Schroeder Public−Key Authentication Protocol
Gavin Lowe
In Information Processing Letters. Vol. 56. No. 3. Pages 131−133. 1995.
Details about An Attack on the Needham−Schroeder Public−Key Authentication Protocol | BibTeX data for An Attack on the Needham−Schroeder Public−Key Authentication Protocol | DOI (10.1016/0020-0190(95)00144-2) | Link to An Attack on the Needham−Schroeder Public−Key Authentication Protocol
-
[10]
Analyses of the Reverse Path Forwarding Routing Algorithm
Christie Bolton and Gavin Lowe
In 2004 International Conference on Dependable Systems and Networks (DSN 2004)‚ 28 June − 1 July 2004‚ Florence‚ Italy‚ Proceedings. Pages 485−494. IEEE Computer Society. 2004.
Details about Analyses of the Reverse Path Forwarding Routing Algorithm | BibTeX data for Analyses of the Reverse Path Forwarding Routing Algorithm | Link to Analyses of the Reverse Path Forwarding Routing Algorithm
-
[11]
Analysing Applications Layered on Unilaterally Authenticating Protocols
Thomas Gibson−Robinson and Gavin Lowe
In Proceedings of Formal Aspects of Security and Trust (FAST 2011). 2011.
Details about Analysing Applications Layered on Unilaterally Authenticating Protocols | BibTeX data for Analysing Applications Layered on Unilaterally Authenticating Protocols | Download (pdf) of Analysing Applications Layered on Unilaterally Authenticating Protocols
-
[12]
Analysing Lock−Free Linearizable Datatypes Using CSP
Gavin Lowe
In Thomas Gibson−Robinson‚ Philippa Hopcroft and Ranko ́Lazic, editors, Concurrency‚ Security and Puzzles: Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday. Vol. 10160 of LNCS. Springer. 2017.
Details about Analysing Lock−Free Linearizable Datatypes Using CSP | BibTeX data for Analysing Lock−Free Linearizable Datatypes Using CSP
-
[13]
Analysing Protocol Subject to Guessing Attacks
Gavin Lowe
In Journal of Computer Security. Vol. 12. No. 1. Pages 83−98. 2004.
Details about Analysing Protocol Subject to Guessing Attacks | BibTeX data for Analysing Protocol Subject to Guessing Attacks | Link to Analysing Protocol Subject to Guessing Attacks
-
[14]
Analysing Security Protocols using CSP
Gavin Lowe
In Véronique Cortier and Steve Kremer, editors, Formal Models and Techniques for Analyzing Security Protocols. IOS Press. 2011.
Details about Analysing Security Protocols using CSP | BibTeX data for Analysing Security Protocols using CSP
-
[15]
Analysing TLS in the Strand Spaces Model
Allaa Kamil and Gavin Lowe
2008.
Details about Analysing TLS in the Strand Spaces Model | BibTeX data for Analysing TLS in the Strand Spaces Model | Download (pdf) of Analysing TLS in the Strand Spaces Model
-
[16]
Analysing TLS in the strand spaced model
Allaa Kamil and Gavin Lowe
In Journal of Computer Security. Vol. 19. No. 5. Pages 975–1025. 2011.
Details about Analysing TLS in the strand spaced model | BibTeX data for Analysing TLS in the strand spaced model | Download (pdf) of Analysing TLS in the strand spaced model
-
[17]
Analysing a Stream Authentication Protocol Using Model Checking
Philippa J. Broadfoot and Gavin Lowe
In Dieter Gollmann‚ Günter Karjoth and Michael Waidner, editors, Computer Security − ESORICS 2002‚ 7th European Symposium on Research in Computer Security‚ Zurich‚ Switzerland‚ October 14−16‚ 2002‚ Proceedings. Vol. 2502 of Lecture Notes in Computer Science. Pages 146−161. Springer. 2002.
Details about Analysing a Stream Authentication Protocol Using Model Checking | BibTeX data for Analysing a Stream Authentication Protocol Using Model Checking
-
[18]
Analysing a stream authentication protocol using model checking
Philippa J. Hopcroft and Gavin Lowe
In Int. J. Inf. Sec.. Vol. 3. No. 1. Pages 2−13. 2004.
The CSP scripts associated with this paper are available here: http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/TESLA/index.html
Details about Analysing a stream authentication protocol using model checking | BibTeX data for Analysing a stream authentication protocol using model checking | DOI (10.1007/s10207-004-0040-1) | Link to Analysing a stream authentication protocol using model checking
-
[19]
Analysing the Information Flow Properties of Object−Capability Patterns
Toby Murray and Gavin Lowe
In Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009). Vol. 5983 of Lecture Notes in Computer Science. Pages 81−95. 2010.
Details about Analysing the Information Flow Properties of Object−Capability Patterns | BibTeX data for Analysing the Information Flow Properties of Object−Capability Patterns | Download (pdf) of Analysing the Information Flow Properties of Object−Capability Patterns | DOI (10.1007/978-3-642-12459-4_7)
-
[20]
Analyzing a Library of Security Protocols using Casper and FDR
Ben Donovan‚ Paul Norris and Gavin Lowe
In Proceedings of the Workshop on Formal Methods and Security Protocols. 1999.
Some of the Casper scripts are available here: http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/prots.tar.gz
Details about Analyzing a Library of Security Protocols using Casper and FDR | BibTeX data for Analyzing a Library of Security Protocols using Casper and FDR
-
[21]
Architectures for Secure Delegation Within Grids
Philippa J. Broadfoot and Gavin Lowe
No. RR−03−19. Oxford University Computing Laboratory. September, 2003.
Details about Architectures for Secure Delegation Within Grids | BibTeX data for Architectures for Secure Delegation Within Grids | Download (ps) of Architectures for Secure Delegation Within Grids
-
[22]
Authority Analysis for Least Privilege Environments
Toby Murray and Gavin Lowe
In Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS−ARSPA'07). 2007.
Details about Authority Analysis for Least Privilege Environments | BibTeX data for Authority Analysis for Least Privilege Environments | Download (pdf) of Authority Analysis for Least Privilege Environments
-
[23]
Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
Alessandro Armando and Gavin Lowe, editors
Details about Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security | BibTeX data for Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security
-
[24]
Automating Data Independence
Philippa J. Broadfoot‚ Gavin Lowe and A. W. Roscoe
In Frédéric Cuppens‚ Yves Deswarte‚ Dieter Gollmann and Michael Waidner, editors, Computer Security − ESORICS 2000‚ 6th European Symposium on Research in Computer Security‚ Toulouse‚ France‚ October 4−6‚ 2000‚ Proceedings. Vol. 1895 of Lecture Notes in Computer Science. Pages 175−190. Springer. 2000.
Details about Automating Data Independence | BibTeX data for Automating Data Independence | DOI (10.1007/10722599_11) | Link to Automating Data Independence
-
[25]
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
Gavin Lowe
In Software − Concepts and Tools. Vol. 17. No. 3. Pages 93−102. 1996.
Details about Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR | BibTeX data for Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR | Link to Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
-
[26]
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
Gavin Lowe
In Tiziana Margaria and Bernhard Steffen, editors, Tools and Algorithms for Construction and Analysis of Systems‚ Second International Workshop‚ TACAS '96‚ Passau‚ Germany‚ March 27−29‚ 1996‚ Proceedings. Vol. 1055 of Lecture Notes in Computer Science. Pages 147−166. Springer. 1996.
Details about Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR | BibTeX data for Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR | Link to Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
-
[27]
CSP−based counter abstraction for systems with node identifiers
Tomasz Mazur and Gavin Lowe
In Science of Computer Programming. 2013.
In press
Details about CSP−based counter abstraction for systems with node identifiers | BibTeX data for CSP−based counter abstraction for systems with node identifiers | Link to CSP−based counter abstraction for systems with node identifiers
-
[28]
Casper: A Compiler for the Analysis of Security Protocols
Gavin Lowe
In 10th Computer Security Foundations Workshop (CSFW '97)‚ June 10−12‚ 1997‚ Rockport‚ Massachusetts‚ USA. Pages 18−30. IEEE Computer Society. 1997.
Details about Casper: A Compiler for the Analysis of Security Protocols | BibTeX data for Casper: A Compiler for the Analysis of Security Protocols | Link to Casper: A Compiler for the Analysis of Security Protocols
-
[29]
Casper: A Compiler for the Analysis of Security Protocols
Gavin Lowe
In Journal of Computer Security. Vol. 6. No. 1−2. Pages 53−84. 1998.
Details about Casper: A Compiler for the Analysis of Security Protocols | BibTeX data for Casper: A Compiler for the Analysis of Security Protocols | Link to Casper: A Compiler for the Analysis of Security Protocols
-
[30]
Concurrent depth−first search algorithms based on Tarjan’s Algorithm
Gavin Lowe
In International Journal on Software Tools for Technology Transfer. Vol. 18. No. 2. Pages 129–147. 2016.
Details about Concurrent depth−first search algorithms based on Tarjan’s Algorithm | BibTeX data for Concurrent depth−first search algorithms based on Tarjan’s Algorithm
-
[31]
Counter Abstraction in the CSP/FDR setting
Tomasz Mazur and Gavin Lowe
In Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems (AVoCS'07). 2007.
Details about Counter Abstraction in the CSP/FDR setting | BibTeX data for Counter Abstraction in the CSP/FDR setting | Download (pdf) of Counter Abstraction in the CSP/FDR setting
-
[32]
Data independent verification of crypto−protocols
A. W. Roscoe‚ Philippa J. Broadfoot and Gavin Lowe
In Electr. Notes Theor. Comput. Sci.. Vol. 40. 2000.
Details about Data independent verification of crypto−protocols | BibTeX data for Data independent verification of crypto−protocols | Link to Data independent verification of crypto−protocols
-
[33]
Defining information flow quantity
Gavin Lowe
In Journal of Computer Security. Vol. 12. No. 3−4. Pages 619−653. 2004.
Details about Defining information flow quantity | BibTeX data for Defining information flow quantity | Link to Defining information flow quantity
-
[34]
Extending CSP with tests for availability
Gavin Lowe
In Procedings of Communicating Process Architectures (CPA 2009). 2009.
Details about Extending CSP with tests for availability | BibTeX data for Extending CSP with tests for availability | Download (pdf) of Extending CSP with tests for availability
-
[35]
Fault−Preserving Simplifying Transformations for Security Protocols
Mei Lin Hui and Gavin Lowe
In Journal of Computer Security. Vol. 9. No. 1/2. Pages 3−46. 2001.
Details about Fault−Preserving Simplifying Transformations for Security Protocols | BibTeX data for Fault−Preserving Simplifying Transformations for Security Protocols | Link to Fault−Preserving Simplifying Transformations for Security Protocols
-
[36]
How to Prevent Type Flaw Attacks on Security Protocols
James Heather‚ Gavin Lowe and Steve Schneider
In CSFW. Pages 255−268. 2000.
Details about How to Prevent Type Flaw Attacks on Security Protocols | BibTeX data for How to Prevent Type Flaw Attacks on Security Protocols | Link to How to Prevent Type Flaw Attacks on Security Protocols
-
[37]
How to Prevent Type Flaw Attacks on Security Protocols
James Heather‚ Gavin Lowe and Steve Schneider
In Journal of Computer Security. Vol. 11. No. 2. Pages 217−244. 2003.
Details about How to Prevent Type Flaw Attacks on Security Protocols | BibTeX data for How to Prevent Type Flaw Attacks on Security Protocols | Link to How to Prevent Type Flaw Attacks on Security Protocols
-
[38]
Implementing Generalised Alt
Gavin Lowe
In Proceedings of Concurrent Process Architectures (CPA 2011). Pages 1–34. 2011.
Details about Implementing Generalised Alt | BibTeX data for Implementing Generalised Alt | Download (pdf) of Implementing Generalised Alt
-
[39]
Managing Dynamic User Communities in a Grid of Autonomous Resources
Roberto Alfieri‚ Roberto Cecchini‚ Vincenzo Ciaschini‚ Luca dell'Agnello‚ Alberto Gianoli‚ Fabio Spataro‚ Franck Bonnassieux‚ Philippa J. Broadfoot‚ Gavin Lowe‚ Linda Cornwall‚ Jens Jensen‚ David P. Kelsey‚ Ákos Frohner‚ David L. Groep‚ Wim Som de Cerff‚ Martijn Steenbakkers‚ Gerben Venekamp‚ Daniel Kouril‚ Andrew McNab‚ Olle Mulmo‚ Mika Silander‚ Joni Hahkala and Károly Lörentey
In CoRR. Vol. cs.DC/0306004. 2003.
Details about Managing Dynamic User Communities in a Grid of Autonomous Resources | BibTeX data for Managing Dynamic User Communities in a Grid of Autonomous Resources | Link to Managing Dynamic User Communities in a Grid of Autonomous Resources
-
[40]
Modelling and analysis of security protocols
Peter Ryan‚ Steve Schneider‚ Michael Goldsmith‚ Gavin Lowe and Bill Roscoe
Addison−Wesley. 2001.
Details about Modelling and analysis of security protocols | BibTeX data for Modelling and analysis of security protocols
-
[41]
Models for CSP with availability information
Gavin Lowe
In Mathematical Structures in Computer Science. Vol. 26. No. 6. Pages 1022–1053. 2016.
Details about Models for CSP with availability information | BibTeX data for Models for CSP with availability information
-
[42]
Models for CSP with availability information
Gavin Lowe
In Proceedings of 17th International Workshop on Expressiveness in Concurrency. 2010.
Details about Models for CSP with availability information | BibTeX data for Models for CSP with availability information
-
[43]
On CSP refinement tests that run multiple copies of a process
Gavin Lowe
2007.
Details about On CSP refinement tests that run multiple copies of a process | BibTeX data for On CSP refinement tests that run multiple copies of a process | Download (pdf) of On CSP refinement tests that run multiple copies of a process
-
[44]
On Distributed Security Transactions that Use Secure Transport Protocols
Philippa J. Broadfoot and Gavin Lowe
In 16th IEEE Computer Security Foundations Workshop (CSFW−16 2003)‚ 30 June − 2 July 2003‚ Pacific Grove‚ CA‚ USA. Pages 141−. IEEE Computer Society. 2003.
Details about On Distributed Security Transactions that Use Secure Transport Protocols | BibTeX data for On Distributed Security Transactions that Use Secure Transport Protocols | Link to On Distributed Security Transactions that Use Secure Transport Protocols
-
[45]
On Information Flow and Refinement−Closure
Gavin Lowe
In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.
Details about On Information Flow and Refinement−Closure | BibTeX data for On Information Flow and Refinement−Closure | Download (pdf) of On Information Flow and Refinement−Closure
-
[46]
On Refinement−Closed Security Properties and Nondeterministic Compositions
Toby Murray and Gavin Lowe
In Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08). Vol. 250 of Electronic Notes in Theoretical Computer Science. No. 2. Pages 49−68. 2009.
Details about On Refinement−Closed Security Properties and Nondeterministic Compositions | BibTeX data for On Refinement−Closed Security Properties and Nondeterministic Compositions | Download (pdf) of On Refinement−Closed Security Properties and Nondeterministic Compositions | DOI (10.1016/j.entcs.2009.08.017)
-
[47]
On Timed Models and Full Abstraction
Gavin Lowe and Joël Ouaknine
In Electr. Notes Theor. Comput. Sci.. Vol. 155. Pages 497−519. 2006.
Details about On Timed Models and Full Abstraction | BibTeX data for On Timed Models and Full Abstraction | DOI (10.1016/j.entcs.2005.11.070) | Link to On Timed Models and Full Abstraction
-
[48]
On the Application of Counterexample−Guided Abstraction refinement and data independence to the parameterised model checking problem
Gavin Lowe
In Proceedings of the Third International Workshop on Automatic Verification of Infinite−State Systems‚ (AVIS 2004). 2004.
Details about On the Application of Counterexample−Guided Abstraction refinement and data independence to the parameterised model checking problem | BibTeX data for On the Application of Counterexample−Guided Abstraction refinement and data independence to the parameterised model checking problem | Link to On the Application of Counterexample−Guided Abstraction refinement and data independence to the parameterised model checking problem
-
[49]
On the Automatic Verification of Non−Standard Measures of Consistency
Christie Bolton and Gavin Lowe
In Joseph M. Morris‚ Benjamin Aziz and Frédéric Oehl, editors, 6th International Workshop on Formal Methods‚ IWFM 2003‚ Dublin City University. 11 July‚ 2003. BCS. 2003.
Details about On the Automatic Verification of Non−Standard Measures of Consistency | BibTeX data for On the Automatic Verification of Non−Standard Measures of Consistency | Link to On the Automatic Verification of Non−Standard Measures of Consistency
-
[50]
On the Specification of Secure Channels
Christopher Dilloway and Gavin Lowe
In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.
Details about On the Specification of Secure Channels | BibTeX data for On the Specification of Secure Channels | Download (pdf) of On the Specification of Secure Channels
-
[51]
Panel Introduction: Varieties of Authentication
Roberto Gorrieri‚ Paul F. Syverson‚ Martín Abadi‚ Riccardo Focardi‚ Dieter Gollmann‚ Gavin Lowe and Catherine Meadows
In Computer Security Foundations Workshop. Pages 79−82. 1998.
Details about Panel Introduction: Varieties of Authentication | BibTeX data for Panel Introduction: Varieties of Authentication | Download (pdf) of Panel Introduction: Varieties of Authentication
-
[52]
Probabilistic and Prioritized Models of Timed CSP
Gavin Lowe
In Theor. Comput. Sci.. Vol. 138. No. 2. Pages 315−352. 1995.
Details about Probabilistic and Prioritized Models of Timed CSP | BibTeX data for Probabilistic and Prioritized Models of Timed CSP | DOI (10.1016/0304-3975(94)00171-E) | Link to Probabilistic and Prioritized Models of Timed CSP
-
[53]
Proofs with Graphs
Sharon Curtis and Gavin Lowe
In Sci. Comput. Program.. Vol. 26. No. 1−3. Pages 197−216. 1996.
Details about Proofs with Graphs | BibTeX data for Proofs with Graphs | Link to Proofs with Graphs
-
[54]
Quantifying Information Flow
Gavin Lowe
In 15th IEEE Computer Security Foundations Workshop (CSFW−15 2002)‚ 24−26 June 2002‚ Cape Breton‚ Nova Scotia‚ Canada. Pages 18−31. IEEE Computer Society. 2002.
Details about Quantifying Information Flow | BibTeX data for Quantifying Information Flow | Link to Quantifying Information Flow
-
[55]
Refinement of Complex Systems: A Case Study
Gavin Lowe and Hussein Zedan
In The Computer Journal. Vol. 38. No. 10. Pages 785−800. 1995.
Details about Refinement of Complex Systems: A Case Study | BibTeX data for Refinement of Complex Systems: A Case Study | Link to Refinement of Complex Systems: A Case Study
-
[56]
Safe Simplifying Transformations for Security Protocols
Mei Lin Hui and Gavin Lowe
In CSFW. Pages 32−43. 1999.
Details about Safe Simplifying Transformations for Security Protocols | BibTeX data for Safe Simplifying Transformations for Security Protocols | Link to Safe Simplifying Transformations for Security Protocols
-
[57]
Scheduling−Oriented Models for Real−Time Systems
Gavin Lowe
In The Computer Journal. Vol. 38. No. 6. Pages 443−456. 1995.
Details about Scheduling−Oriented Models for Real−Time Systems | BibTeX data for Scheduling−Oriented Models for Real−Time Systems | Link to Scheduling−Oriented Models for Real−Time Systems
-
[58]
Semantic models for information flow
Gavin Lowe
In Theor. Comput. Sci.. Vol. 315. No. 1. Pages 209−256. 2004.
Details about Semantic models for information flow | BibTeX data for Semantic models for information flow | DOI (10.1016/j.tcs.2003.11.019) | Link to Semantic models for information flow
-
[59]
Some new attacks upon security protocols
Gavin Lowe
In Ninth IEEE Computer Security Foundations Workshop‚ March 10 − 12‚ 1996‚ Dromquinna Manor‚ Kenmare‚ County Kerry‚ Ireland. Pages 162−169. IEEE Computer Society. 1996.
Details about Some new attacks upon security protocols | BibTeX data for Some new attacks upon security protocols | Link to Some new attacks upon security protocols
-
[60]
Specification of communicating processes: temporal logic versus refusals−based refinement
Gavin Lowe
In Formal Aspects of Computing. 2008.
Details about Specification of communicating processes: temporal logic versus refusals−based refinement | BibTeX data for Specification of communicating processes: temporal logic versus refusals−based refinement | Download (pdf) of Specification of communicating processes: temporal logic versus refusals−based refinement
-
[61]
Specifying Secure Transport Layers
Christopher Dilloway and Gavin Lowe
In 21st IEEE Computer Security Foundations Symposium (CSF 21). 2008.
Details about Specifying Secure Transport Layers | BibTeX data for Specifying Secure Transport Layers | Download (pdf) of Specifying Secure Transport Layers
-
[62]
Specifying and Modelling Secure Channels in Strand Spaces
Allaa Kamil and Gavin Lowe
In Proceedings of the Worskshop on Formal Aspects of Security and Trust (FAST 2009). 2009.
Details about Specifying and Modelling Secure Channels in Strand Spaces | BibTeX data for Specifying and Modelling Secure Channels in Strand Spaces | Download (pdf) of Specifying and Modelling Secure Channels in Strand Spaces
-
[63]
Testing for Linearizability
Gavin Lowe
In Concurrency and Computation: Practice and Experience. Vol. 29. No. 4. 2017.
Details about Testing for Linearizability | BibTeX data for Testing for Linearizability
-
[64]
Towards a Completeness Result for Model Checking of Security Protocols
Gavin Lowe
In Computer Security Foundations Workshop. Pages 96−105. 1998.
Details about Towards a Completeness Result for Model Checking of Security Protocols | BibTeX data for Towards a Completeness Result for Model Checking of Security Protocols | Download (pdf) of Towards a Completeness Result for Model Checking of Security Protocols
-
[65]
Towards a Completeness Result for Model Checking of Security Protocols
Gavin Lowe
In Journal of Computer Security. Vol. 7. No. 1. 1999.
Details about Towards a Completeness Result for Model Checking of Security Protocols | BibTeX data for Towards a Completeness Result for Model Checking of Security Protocols | Link to Towards a Completeness Result for Model Checking of Security Protocols
-
[66]
Understanding Abstractions of Secure Channels
Allaa Kamil and Gavin Lowe
In Proceedings of Formal Aspects of Security and Trust (FAST 2010). 2010.
Details about Understanding Abstractions of Secure Channels | BibTeX data for Understanding Abstractions of Secure Channels
-
[67]
Using CSP to Detect Errors in the TMN Protocol
Gavin Lowe and A. W. Roscoe
In IEEE Trans. Software Eng.. Vol. 23. No. 10. Pages 659−669. 1997.
Details about Using CSP to Detect Errors in the TMN Protocol | BibTeX data for Using CSP to Detect Errors in the TMN Protocol | Link to Using CSP to Detect Errors in the TMN Protocol
-
[68]
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area
Gordon Thomas Rohrmair and Gavin Lowe
In Ali E. Abdallah‚ Peter Ryan and Steve Schneider, editors, Formal Aspects of Security‚ First International Conference‚ FASec 2002‚ London‚ UK‚ December 16−18‚ 2002‚ Revised Papers. Vol. 2629 of Lecture Notes in Computer Science. Pages 205−220. Springer. 2002.
Details about Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area | BibTeX data for Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area | Link to Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area
-
[69]
Using CSP to Verify Sequential Consistency
Gavin Lowe and Jim Davies
In Distributed Computing. Vol. 12. No. 2−3. Pages 91−103. 1999.
Details about Using CSP to Verify Sequential Consistency | BibTeX data for Using CSP to Verify Sequential Consistency | Link to Using CSP to Verify Sequential Consistency
-
[70]
Using data−independence in the analysis of intrusion detection systems
Gordon Thomas Rohrmair and Gavin Lowe
In Theor. Comput. Sci.. Vol. 340. No. 1. Pages 82−101. 2005.
Details about Using data−independence in the analysis of intrusion detection systems | BibTeX data for Using data−independence in the analysis of intrusion detection systems | DOI (10.1016/j.tcs.2005.03.004) | Link to Using data−independence in the analysis of intrusion detection systems
-
[71]
Verifying layered security protocols
Thomas Gibson−Robinson‚ Allaa Kamil and Gavin Lowe
In Journal of Computer Security. Vol. 23. No. 3. Pages 259–307. 2015.
Details about Verifying layered security protocols | BibTeX data for Verifying layered security protocols
-
[72]
A Debugger for Communicating Scala Objects
Andrew Bate and Gavin Lowe
In Peter H. Welch‚ Frederick R. M. Barnes‚ Kevin Chalmers‚ Jan Bækgaard Pedersen and Adam T. Sampson, editors, Communicating Process Architectures 2012. Pages 135–154. August, 2012.
Details about A Debugger for Communicating Scala Objects | BibTeX data for A Debugger for Communicating Scala Objects | Download (pdf) of A Debugger for Communicating Scala Objects
-
[73]
Probabilities and Priorities in Timed CSP
Gavin Lowe
PhD Thesis , type= DPhil thesis. Oxford University Computing Laboratory. 1993.
Details about Probabilities and Priorities in Timed CSP | BibTeX data for Probabilities and Priorities in Timed CSP | Link to Probabilities and Priorities in Timed CSP