Skip to main content

Gavin Lowe : Publications

Click here to download all publications in a single bibtex file

@article{linearizability-testing,
  title = "Testing for Linearizability",
  author = "Gavin Lowe",
  year = "2017",
  journal = "Concurrency and Computation: Practice and Experience",
  number = "4",
  volume = "29",
}
@incollection{lock-free-queue-analysis,
  title = "Analysing Lock-Free Linearizable Datatypes Using CSP",
  author = "Gavin Lowe",
  year = "2017",
  booktitle = "Concurrency, Security and Puzzles: Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday",
  editor = "Thomas Gibson-Robinson and Philippa Hopcroft and Ranko Lazi\'c",
  publisher = "Springer",
  series = "LNCS",
  volume = "10160",
}
@article{availability,
  title = "Models for CSP with availability information",
  author = "Gavin Lowe",
  year = "2016",
  journal = "Mathematical Structures in Computer Science",
  number = "6",
  pages = "1022--1053",
  volume = "26",
}
@article{parallel-tarjan,
  title = "Concurrent depth-first search algorithms based on Tarjan’s Algorithm",
  author = "Gavin Lowe",
  year = "2016",
  journal = "International Journal on Software Tools for Technology Transfer",
  number = "2",
  pages = "129--147",
  volume = "18",
}
@article{layering-JCS,
  title = "Verifying layered security protocols",
  author = "Thomas Gibson-Robinson and Allaa Kamil and Gavin Lowe",
  year = "2015",
  journal = "Journal of Computer Security",
  number = "3",
  pages = "259--307",
  volume = "23",
}
@article{counter-abstraction,
  title = "CSP-based counter abstraction for systems with node identifiers",
  author = "Tomasz Mazur and Gavin Lowe",
  year = "2013",
  journal = "Science of Computer Programming",
  note = "In press",
  url = "http://dx.doi.org/10.1016/j.scico.2013.03.018",
}
@inproceedings{BateLowe12,
  title = "{A Debugger for Communicating Scala Objects}",
  author = "Andrew Bate and Gavin Lowe",
  year = "2012",
  booktitle = "{Communicating Process Architectures 2012}",
  editor = "Welch, Peter H. and Barnes, Frederick R. M. and Chalmers, Kevin and Pedersen, Jan B{\ae}kgaard and Sampson, Adam T.",
  isbn = "978-0-9565409-5-9",
  month = "aug",
  pages = "135--154",
}
@article{type-reduction,
  title = "A type reduction theory for systems with replicated components",
  author = "Tomasz Mazur and Gavin Lowe",
  year = "2012",
  journal = "Logical Methods in Computer Science",
  url = "http://www.cs.ox.ac.uk/gavin.lowe/Papers/typereduction.pdf",
}
@article{TLS-paper,
  title = "Analysing TLS in the strand spaced model",
  author = "Allaa Kamil and Gavin Lowe",
  year = "2011",
  journal = "Journal of Computer Security",
  number = "5",
  pages = "975--1025",
  url = "http://www.cs.ox.ac.uk/gavin.lowe/Papers/TLSpaper.pdf",
  volume = "19",
}
@inproceedings{unilateral,
  title = "Analysing Applications Layered on Unilaterally Authenticating Protocols",
  author = "Thomas Gibson-Robinson and Gavin Lowe",
  year = "2011",
  booktitle = "Proceedings of Formal Aspects of Security and Trust (FAST 2011)",
  url = "http://www.cs.ox.ac.uk/gavin.lowe/Papers/unilateral.pdf",
}
@inproceedings{alt,
  title = "Implementing Generalised Alt",
  author = "Gavin Lowe",
  year = "2011",
  booktitle = "Proceedings of Concurrent Process Architectures (CPA 2011)",
  pages = "1--34",
  url = "http://www.cs.ox.ac.uk/gavin.lowe/Papers/alt.pdf",
}
@incollection{cortier-kremer-book,
  title = "Analysing Security Protocols using {CSP}",
  author = "Gavin Lowe",
  year = "2011",
  booktitle = "Formal Models and Techniques for Analyzing Security Protocols",
  editor = "V\'eronique Cortier and Steve Kremer",
  publisher = "IOS Press",
}
@inproceedings{strands-abstraction,
  title = "Understanding Abstractions of Secure Channels",
  author = "Allaa Kamil and Gavin Lowe",
  year = "2010",
  booktitle = "Proceedings of Formal Aspects of Security and Trust (FAST 2010)",
}
@inproceedings{availability,
  title = "Models for CSP with availability information",
  author = "Gavin Lowe",
  year = "2010",
  booktitle = "Proceedings of 17th International Workshop on Expressiveness in Concurrency",
}
@inproceedings{murray10-infoflow,
  title = "Analysing the Information Flow Properties of Object-Capability Patterns",
  author = "Toby Murray and Gavin Lowe",
  year = "2010",
  booktitle = "Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009)",
  pages = "81-95",
  series = "Lecture Notes in Computer Science",
  volume = "5983",
  doi = "10.1007/978-3-642-12459-4_7",
}
@proceedings{arspa-wits-2010,
  title = "Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security",
  year = "2010",
  editor = "Alessandro Armando and Gavin Lowe",
  number = "6186",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
}
@article{strands-channels,
  title = "Specifying and Modelling Secure Channels in Strand Spaces",
  author = "Allaa Kamil and Gavin Lowe",
  year = "2009",
  booktitle = "Proceedings of the Worskshop on Formal Aspects of Security and Trust (FAST 2009)",
  howpublished = "In Proceedings of the Worskshop on Formal Aspects of Security and Trust (FAST 2009)",
  journal = "Proceedings of the Worskshop on Formal Aspects of Security and Trust (FAST 2009)",
}
@article{ready-tests,
  title = "Extending CSP with tests for availability",
  author = "Gavin Lowe",
  year = "2009",
  booktitle = "Procedings of Communicating Process Architectures (CPA 2009)",
  howpublished = "In Procedings of Communicating Process Architectures (CPA 2009)",
  journal = "Procedings of Communicating Process Architectures (CPA 2009)",
}
@conference{murray09-avocs08,
  title = "On Refinement-Closed Security Properties and Nondeterministic Compositions",
  author = "Toby Murray and Gavin Lowe",
  year = "2009",
  booktitle = "Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08)",
  number = "2",
  pages = "49-68",
  series = "Electronic Notes in Theoretical Computer Science",
  volume = "250",
  doi = "10.1016/j.entcs.2009.08.017",
}
@article{temporal-logic,
  title = "Specification of communicating processes: temporal logic versus refusals-based refinement",
  author = "Gavin Lowe",
  year = "2008",
  journal = "Formal Aspects of Computing",
}
@conference{chris08csf,
  title = "Specifying Secure Transport Layers",
  author = "Christopher Dilloway and Gavin Lowe",
  year = "2008",
  booktitle = "21st IEEE Computer Security Foundations Symposium (CSF 21)",
}
@techreport{440,
  title = "Analysing TLS in the Strand Spaces Model",
  author = "Allaa Kamil and Gavin Lowe",
  year = "2008",
}
@inproceedings{mazur:2007,
  title = "Counter Abstraction in the CSP/FDR setting",
  author = "Tomasz Mazur and Gavin Lowe",
  year = "2007",
  booktitle = "Proceedings of the Seventh International Workshop on Automated Verification of Critical Systems (AVoCS'07)",
  url = "http://web.comlab.ox.ac.uk/people/tomasz.mazur/publications/counterabstraction_AVoCS.pdf",
}
@conference{harness,
  title = "On CSP refinement tests that run multiple copies of a process",
  author = "Gavin Lowe",
  year = "2007",
  journal = "Proceedings of Workshop on Automated Verification of Critical Systems (AVoCS 2007)",
}
@inproceedings{inproc/Lowe2007,
  title = "On Information Flow and Refinement-Closure",
  author = "Gavin Lowe",
  year = "2007",
  booktitle = "{Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)}",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/NDC.pdf",
}
@inproceedings{inproc/Murray2007,
  title = "Authority Analysis for Least Privilege Environments",
  author = "Toby Murray and Gavin Lowe",
  year = "2007",
  booktitle = "{Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07)}",
}
@conference{cdilloway2007spec,
  title = "On the Specification of Secure Channels",
  author = "Christopher Dilloway and Gavin Lowe",
  year = "2007",
  booktitle = "Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)",
}
@article{journals/entcs/LoweO06,
  title = "On Timed Models and Full Abstraction",
  author = "Gavin Lowe and Jo{\"e}l Ouaknine",
  year = "2006",
  journal = "Electr. Notes Theor. Comput. Sci.",
  pages = "497-519",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/timedTesting.ps",
  volume = "155",
  doi = "10.1016/j.entcs.2005.11.070",
}
@inproceedings{inproc/Newcomb,
  title = "A Computational Justification for Guessing Attack Formalisms",
  author = "Tom Newcomb and Gavin Lowe",
  year = "2006",
  booktitle = "{Proceedings of the Workshop on Issues in the Theory of Security (WITS '06)}",
}
@techreport{RR-05-05,
  title = "A computational justification for guessing attack formalisms",
  author = "Tom Newcomb and Gavin Lowe",
  year = "2005",
  institution = "Oxford University Computing Laboratory",
  month = "October",
  number = "RR-05-05",
}
@article{journals/tcs/RohrmairL05,
  title = "Using data-independence in the analysis of intrusion detection systems",
  author = "Gordon Thomas Rohrmair and Gavin Lowe",
  year = "2005",
  journal = "Theor. Comput. Sci.",
  number = "1",
  pages = "82-101",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/intrusion.ps",
  volume = "340",
  doi = "10.1016/j.tcs.2005.03.004",
}
@article{journals/tcs/BoltonL05,
  title = "A hierarchy of failures-based models: theory and application",
  author = "Christie Bolton and Gavin Lowe",
  year = "2005",
  journal = "Theoretical Computer Science",
  number = "3",
  pages = "407-438",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/EXPRESS.ps",
  volume = "330",
  doi = "10.1016/j.tcs.2004.10.004",
}
@article{journals/tcs/Lowe04,
  title = "Semantic models for information flow",
  author = "Gavin Lowe",
  year = "2004",
  journal = "Theor. Comput. Sci.",
  number = "1",
  pages = "209-256",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/infoflow.ps",
  volume = "315",
  doi = "10.1016/j.tcs.2003.11.019",
}
@article{journals/jcs/Lowe04a,
  title = "Defining information flow quantity",
  author = "Gavin Lowe",
  year = "2004",
  journal = "Journal of Computer Security",
  number = "3-4",
  pages = "619-653",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/capacityJCS.ps",
  volume = "12",
}
@article{journals/jcs/Lowe04,
  title = "Analysing Protocol Subject to Guessing Attacks",
  author = "Gavin Lowe",
  year = "2004",
  journal = "Journal of Computer Security",
  number = "1",
  pages = "83-98",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/guessing.ps",
  volume = "12",
}
@article{journals/ijisec/HopcroftL04,
  title = "Analysing a stream authentication protocol using model checking",
  author = "Philippa J. Hopcroft and Gavin Lowe",
  year = "2004",
  journal = "Int. J. Inf. Sec.",
  note = "The {CSP} scripts associated with this paper are available here: \url{http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/TESLA/index.html}",
  number = "1",
  pages = "2-13",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/TESLA.ps",
  volume = "3",
  doi = "10.1007/s10207-004-0040-1",
}
@article{journals/entcs/BoltonL04,
  title = "A Hierarchy of Failures-Based Models",
  author = "Christie Bolton and Gavin Lowe",
  year = "2004",
  journal = "Electr. Notes Theor. Comput. Sci.",
  pages = "129-152",
  volume = "96",
  doi = "10.1016/j.entcs.2004.04.025",
}
@inproceedings{conf/dsn/BoltonL04,
  title = "Analyses of the Reverse Path Forwarding Routing Algorithm",
  author = "Christie Bolton and Gavin Lowe",
  year = "2004",
  booktitle = "2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings",
  isbn = "0-7695-2052-9",
  pages = "485-494",
  publisher = "IEEE Computer Society",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/RPF.ps",
}
@inproceedings{inproc/avis,
  title = "On the Application of Counterexample-Guided Abstraction refinement and data independence to the parameterised model checking problem",
  author = "Gavin Lowe",
  year = "2004",
  booktitle = "{Proceedings of the Third International Workshop on Automatic Verification of Infinite-State Systems, (AVIS 2004)}",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/CEGAR.ps",
}
@techreport{RR-03-19,
  title = "Architectures for Secure Delegation Within Grids",
  author = "Philippa J. Broadfoot and Gavin Lowe",
  year = "2003",
  institution = "Oxford University Computing Laboratory",
  month = "September",
  number = "RR-03-19",
}
@article{journals/jcs/HeatherLS03,
  title = "How to Prevent Type Flaw Attacks on Security Protocols",
  author = "James Heather and Gavin Lowe and Steve Schneider",
  year = "2003",
  journal = "Journal of Computer Security",
  number = "2",
  pages = "217-244",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/typing.ps",
  volume = "11",
}
@article{journals/corr/cs-DC-0306004,
  title = "Managing Dynamic User Communities in a Grid of Autonomous Resources",
  author = "Roberto Alfieri and Roberto Cecchini and Vincenzo Ciaschini and Luca dell'Agnello and Alberto Gianoli and Fabio Spataro and Franck Bonnassieux and Philippa J. Broadfoot and Gavin Lowe and Linda Cornwall and Jens Jensen and David P. Kelsey and {\'A}kos Frohner and David L. Groep and Wim Som de Cerff and Martijn Steenbakkers and Gerben Venekamp and Daniel Kouril and Andrew McNab and Olle Mulmo and Mika Silander and Joni Hahkala and K{\'a}roly L{\"o}rentey",
  year = "2003",
  journal = "CoRR",
  url = "http://arxiv.org/abs/cs.DC/0306004",
  volume = "cs.DC/0306004",
}
@inproceedings{conf/iwfm/BoltonL03,
  title = "On the Automatic Verification of Non-Standard Measures of Consistency",
  author = "Christie Bolton and Gavin Lowe",
  year = "2003",
  booktitle = "6th International Workshop on Formal Methods, IWFM 2003, Dublin City University. 11 July, 2003",
  editor = "Joseph M. Morris and Benjamin Aziz and Fr{\'e}d{\'e}ric Oehl",
  publisher = "BCS",
  series = "Workshops in Computing",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Papers/IWFM.ps",
}
@inproceedings{conf/csfw/BroadfootL03,
  title = "On Distributed Security Transactions that Use Secure Transport Protocols",
  author = "Philippa J. Broadfoot and Gavin Lowe",
  year = "2003",
  booktitle = "16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA",
  isbn = "0-7695-1927-X",
  pages = "141-",
  publisher = "IEEE Computer Society",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/layering.ps",
}
@inproceedings{conf/fasec/RohrmairL02,
  title = "Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area",
  author = "Gordon Thomas Rohrmair and Gavin Lowe",
  year = "2002",
  booktitle = "Formal Aspects of Security, First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers",
  editor = "Ali E. Abdallah and Peter Ryan and Steve Schneider",
  isbn = "3-540-20693-0",
  pages = "205-220",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/IDS.ps",
  volume = "2629",
}
@inproceedings{conf/esorics/BroadfootL02,
  title = "Analysing a Stream Authentication Protocol Using Model Checking",
  author = "Philippa J. Broadfoot and Gavin Lowe",
  year = "2002",
  booktitle = "Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings",
  editor = "Dieter Gollmann and G{\"u}nter Karjoth and Michael Waidner",
  isbn = "3-540-44345-2",
  pages = "146-161",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  volume = "2502",
}
@inproceedings{conf/csfw/Lowe02,
  title = "Quantifying Information Flow",
  author = "Gavin Lowe",
  year = "2002",
  booktitle = "15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 24-26 June 2002, Cape Breton, Nova Scotia, Canada",
  isbn = "0-7695-1689-0",
  pages = "18-31",
  publisher = "IEEE Computer Society",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/capacity.ps",
}
@book{book/Lowe,
  title = "Modelling and analysis of security protocols",
  author = "Peter Ryan and Steve Schneider and Michael Goldsmith and Gavin Lowe and Bill Roscoe",
  year = "2001",
  isbn = "0201674718",
  publisher = "Addison-Wesley",
}
@article{journals/jcs/HuiL01,
  title = "Fault-Preserving Simplifying Transformations for Security Protocols",
  author = "Mei Lin Hui and Gavin Lowe",
  year = "2001",
  journal = "Journal of Computer Security",
  number = "1/2",
  pages = "3-46",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/simplifyJCS.ps",
  volume = "9",
}
@article{journals/entcs/RoscoeBL00I,
  title = "Data independent verification of crypto-protocols",
  author = "A. W. Roscoe and Philippa J. Broadfoot and Gavin Lowe",
  year = "2000",
  journal = "Electr. Notes Theor. Comput. Sci.",
  url = "http://www.elsevier.com/gej-ng/31/29/23/97/27/show/Products/notes/index.htt\#034",
  volume = "40",
}
@inproceedings{conf/esorics/BroadfootLR00,
  title = "Automating Data Independence",
  author = "Philippa J. Broadfoot and Gavin Lowe and A. W. Roscoe",
  year = "2000",
  booktitle = "Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings",
  editor = "Fr{\'e}d{\'e}ric Cuppens and Yves Deswarte and Dieter Gollmann and Michael Waidner",
  isbn = "3-540-41031-7",
  pages = "175-190",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/BLR_esorics00.ps",
  volume = "1895",
  doi = "10.1007/10722599_11",
}
@inproceedings{conf/csfw/HeatherLS00,
  title = "How to Prevent Type Flaw Attacks on Security Protocols",
  author = "James Heather and Gavin Lowe and Steve Schneider",
  year = "2000",
  booktitle = "CSFW",
  pages = "255-268",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/typingJCS.ps",
}
@article{journals/jcs/Lowe99,
  title = "Towards a Completeness Result for Model Checking of Security Protocols",
  author = "Gavin Lowe",
  year = "1999",
  journal = "Journal of Computer Security",
  number = "1",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/completeness.ps",
  volume = "7",
}
@article{journals/dc/LoweD99,
  title = "Using CSP to Verify Sequential Consistency",
  author = "Gavin Lowe and Jim Davies",
  year = "1999",
  journal = "Distributed Computing",
  number = "2-3",
  pages = "91-103",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Papers/cache.ps.gz",
  volume = "12",
}
@inproceedings{inproc/Donovan/99,
  title = "Analyzing a Library of Security Protocols using {Casper} and {FDR}",
  author = "Ben Donovan and Paul Norris and Gavin Lowe",
  year = "1999",
  booktitle = "{Proceedings of the Workshop on Formal Methods and Security Protocols}",
  note = "Some of the {Casper} scripts are available here: \url{http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Security/Papers/prots.tar.gz}",
}
@inproceedings{conf/csfw/Lowe99,
  title = "Safe Simplifying Transformations for Security Protocols",
  author = "Mei Lin Hui and Gavin Lowe",
  year = "1999",
  booktitle = "CSFW",
  pages = "32-43",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/simplify.ps",
}
@article{journals/jcs/Lowe98,
  title = "Casper: A Compiler for the Analysis of Security Protocols",
  author = "Gavin Lowe",
  year = "1998",
  journal = "Journal of Computer Security",
  number = "1-2",
  pages = "53-84",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Casper/casper.ps",
  volume = "6",
}
@inproceedings{conf/csfw/Lowe98,
  title = "Towards a Completeness Result for Model Checking of Security Protocols",
  author = "Gavin Lowe",
  year = "1998",
  booktitle = "Computer Security Foundations Workshop",
  pages = "96-105",
  url = "http://dlib.computer.org/conferen/csfw/8488/pdf/84880096.pdf",
}
@inproceedings{conf/csfw/GorrieriSAFGLM98,
  title = "Panel Introduction: Varieties of Authentication",
  author = "Roberto Gorrieri and Paul F. Syverson and Mart\'{\i}n Abadi and Riccardo Focardi and Dieter Gollmann and Gavin Lowe and Catherine Meadows",
  year = "1998",
  booktitle = "Computer Security Foundations Workshop",
  pages = "79-82",
  url = "http://dlib.computer.org/conferen/csfw/8488/pdf/84880079.pdf",
}
@article{journals/tse/LoweR97,
  title = "Using CSP to Detect Errors in the TMN Protocol",
  author = "Gavin Lowe and A. W. Roscoe",
  year = "1997",
  journal = "IEEE Trans. Software Eng.",
  number = "10",
  pages = "659-669",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/TMN.ps",
  volume = "23",
}
@inproceedings{conf/csfw/Lowe97a,
  title = "A Hierarchy of Authentication Specification",
  author = "Gavin Lowe",
  year = "1997",
  booktitle = "10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA",
  pages = "31-44",
  publisher = "IEEE Computer Society",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/authentication.ps",
}
@inproceedings{conf/csfw/Lowe97,
  title = "Casper: A Compiler for the Analysis of Security Protocols",
  author = "Gavin Lowe",
  year = "1997",
  booktitle = "10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA",
  pages = "18-30",
  publisher = "IEEE Computer Society",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Casper/casper.ps",
}
@techreport{tr/Lowe1997/5,
  title = "A Family of Attacks upon Authentication Protocols",
  author = "Gavin Lowe",
  year = "1997",
  institution = "Department of Mathematics and Computer Science, University of Leicester",
  number = "1997/5",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/multiplicityTR.ps",
}
@article{journals/stp/Lowe96,
  title = "Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR",
  author = "Gavin Lowe",
  year = "1996",
  journal = "Software - Concepts and Tools",
  number = "3",
  pages = "93-102",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/NSFDR.ps",
  volume = "17",
}
@article{journals/scp/CurtisL96,
  title = "Proofs with Graphs",
  author = "Sharon Curtis and Gavin Lowe",
  year = "1996",
  journal = "Sci. Comput. Program.",
  number = "1-3",
  pages = "197-216",
  url = "http://cms.brookes.ac.uk/staff/SharonCurtis/publications/graphSCP.ps.gz",
  volume = "26",
}
@inproceedings{conf/tacas/Lowe96,
  title = "Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR",
  author = "Gavin Lowe",
  year = "1996",
  booktitle = "Tools and Algorithms for Construction and Analysis of Systems, Second International Workshop, TACAS '96, Passau, Germany, March 27-29, 1996, Proceedings",
  editor = "Tiziana Margaria and Bernhard Steffen",
  isbn = "3-540-61042-1",
  pages = "147-166",
  publisher = "Springer",
  series = "Lecture Notes in Computer Science",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/NSFDR.ps",
  volume = "1055",
}
@inproceedings{conf/csfw/Lowe96,
  title = "Some new attacks upon security protocols",
  author = "Gavin Lowe",
  year = "1996",
  booktitle = "Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland",
  pages = "162-169",
  publisher = "IEEE Computer Society",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/attacks.ps",
}
@article{journals/tcs/Lowe95,
  title = "Probabilistic and Prioritized Models of Timed CSP",
  author = "Gavin Lowe",
  year = "1995",
  journal = "Theor. Comput. Sci.",
  number = "2",
  pages = "315-352",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Papers/Probs/MFPS.ps.gz",
  volume = "138",
  doi = "10.1016/0304-3975(94)00171-E",
}
@article{journals/ipl/Lowe95,
  title = "An Attack on the Needham-Schroeder Public-Key Authentication Protocol",
  author = "Gavin Lowe",
  year = "1995",
  journal = "Information Processing Letters",
  number = "3",
  pages = "131-133",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Security/Papers/NSPKP.ps",
  volume = "56",
  doi = "10.1016/0020-0190(95)00144-2",
}
@article{journals/cj/Lowe95,
  title = "Scheduling-Oriented Models for Real-Time Systems",
  author = "Gavin Lowe",
  year = "1995",
  journal = "The Computer Journal",
  number = "6",
  pages = "443-456",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Papers/TAM/scheduling.ps.gz",
  volume = "38",
}
@article{journals/cj/LoweZ95,
  title = "Refinement of Complex Systems: A Case Study",
  author = "Gavin Lowe and Hussein Zedan",
  year = "1995",
  journal = "The Computer Journal",
  number = "10",
  pages = "785-800",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Papers/TAM/casestudy.ps.gz",
  volume = "38",
}
@inproceedings{/inproc/mpc/Lowe95II,
  title = "A Graphical Calculus",
  author = "Sharon Curtis and Gavin Lowe",
  year = "1995",
  booktitle = "{Mathematics of Program Construction}",
  publisher = "Lecture Notes in Computer Science",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Papers/graph.ps.gz",
  volume = "947",
}
@phdthesis{/thesis/Lowe93,
  title = "{Probabilities and Priorities in Timed CSP}",
  author = "Gavin Lowe",
  year = "1993",
  school = "Oxford University Computing Laboratory",
  url = "http://www.cs.ox.ac.uk/people/gavin.lowe/Papers/Probs/thesis.ps.gz",
}