Gavin Lowe

From MaRDI portal
(Redirected from Person:557890)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Analysing a stream authentication protocol using model checking
Computer Security — ESORICS 2002
2022-02-16Paper
View abstraction for systems with component identities2021-05-04Paper
Models for CSP with availability information2021-02-24Paper
Using CSP to verify sequential consistency2020-12-03Paper
Discovering and correcting a deadlock in a channel implementation
Formal Aspects of Computing
2019-09-04Paper
Lock-free concurrent binomial heaps
Journal of Logical and Algebraic Methods in Programming
2018-11-01Paper
FDR: from theory to industrial application2018-03-26Paper
Analysing lock-free linearizable datatypes using CSP2018-03-26Paper
Models for CSP with availability information
Mathematical Structures in Computer Science
2017-04-04Paper
On CSP refinement tests that run multiple copies of a process
Electronic Notes in Theoretical Computer Science
2016-06-06Paper
Counter abstraction in the CSP/FDR setting
Electronic Notes in Theoretical Computer Science
2016-06-06Paper
On refinement-closed security properties and nondeterministic compositions
Electronic Notes in Theoretical Computer Science
2015-03-18Paper
On timed models and full abstraction2013-10-08Paper
A hierarchy of failures-based models2013-09-09Paper
A type reduction theory for systems with replicated components
Logical Methods in Computer Science
2012-04-03Paper
Specification of communicating processes: temporal logic versus refusals-based refinement
Formal Aspects of Computing
2008-06-25Paper
Using data-independence in the analysis of intrusion detection systems
Theoretical Computer Science
2005-06-30Paper
A hierarchy of failures-based models: theory and application
Theoretical Computer Science
2005-02-22Paper
Semantic models for information flow
Theoretical Computer Science
2004-08-06Paper
Probabilistic and prioritized models of timed CSP
Theoretical Computer Science
1997-02-28Paper
An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
1997-02-28Paper
Proofs with graphs
Science of Computer Programming
1996-07-03Paper


Research outcomes over time


This page was built for person: Gavin Lowe