Gavin Lowe

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Analysing a stream authentication protocol using model checking
Computer Security — ESORICS 2002
2022-02-16Paper
View abstraction for systems with component identities2021-05-04Paper
Models for CSP with availability information2021-02-24Paper
Using CSP to verify sequential consistency2020-12-03Paper
Discovering and correcting a deadlock in a channel implementation
Formal Aspects of Computing
2019-09-04Paper
Lock-free concurrent binomial heaps
Journal of Logical and Algebraic Methods in Programming
2018-11-01Paper
FDR: from theory to industrial application2018-03-26Paper
Analysing lock-free linearizable datatypes using CSP2018-03-26Paper
Models for CSP with availability information
Mathematical Structures in Computer Science
2017-04-04Paper
On CSP refinement tests that run multiple copies of a process
Electronic Notes in Theoretical Computer Science
2016-06-06Paper
Counter abstraction in the CSP/FDR setting
Electronic Notes in Theoretical Computer Science
2016-06-06Paper
On refinement-closed security properties and nondeterministic compositions
Electronic Notes in Theoretical Computer Science
2015-03-18Paper
On timed models and full abstraction2013-10-08Paper
A hierarchy of failures-based models2013-09-09Paper
A type reduction theory for systems with replicated components
Logical Methods in Computer Science
2012-04-03Paper
Specification of communicating processes: temporal logic versus refusals-based refinement
Formal Aspects of Computing
2008-06-25Paper
Using data-independence in the analysis of intrusion detection systems
Theoretical Computer Science
2005-06-30Paper
A hierarchy of failures-based models: theory and application
Theoretical Computer Science
2005-02-22Paper
Semantic models for information flow
Theoretical Computer Science
2004-08-06Paper
Probabilistic and prioritized models of timed CSP
Theoretical Computer Science
1997-02-28Paper
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
1997-02-28Paper
Proofs with graphs
Science of Computer Programming
1996-07-03Paper


Research outcomes over time


This page was built for person: Gavin Lowe