Gavin Lowe

5.8k total citations
65 papers, 2.6k citations indexed

About

Gavin Lowe is a scholar working on Computer Networks and Communications, Artificial Intelligence and Computational Theory and Mathematics. According to data from OpenAlex, Gavin Lowe has authored 65 papers receiving a total of 2.6k indexed citations (citations by other indexed papers that have themselves been cited), including 39 papers in Computer Networks and Communications, 33 papers in Artificial Intelligence and 30 papers in Computational Theory and Mathematics. Recurrent topics in Gavin Lowe's work include Formal Methods in Verification (30 papers), Advanced Authentication Protocols Security (23 papers) and User Authentication and Security Systems (20 papers). Gavin Lowe is often cited by papers focused on Formal Methods in Verification (30 papers), Advanced Authentication Protocols Security (23 papers) and User Authentication and Security Systems (20 papers). Gavin Lowe collaborates with scholars based in United Kingdom, Sweden and Italy. Gavin Lowe's co-authors include Bill Roscoe, Steve Schneider, James Heather, Michael Goldsmith, Peter Y. A. Ryan, Andrew Spicer, Tracey A. Beacham, Michael J. Allen, Michiel Matthijs and Andrew Landels and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Transactions on Software Engineering and Plant Biotechnology Journal.

In The Last Decade

Gavin Lowe

63 papers receiving 2.3k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Gavin Lowe United Kingdom 21 2.0k 1.6k 1.4k 474 341 65 2.6k
M. Abadi United States 21 1.5k 0.8× 1.3k 0.8× 1.8k 1.2× 495 1.0× 398 1.2× 51 2.6k
Joshua D. Guttman United States 20 1.3k 0.6× 917 0.6× 954 0.7× 220 0.5× 252 0.7× 50 1.7k
Bruno Blanchet France 24 1.5k 0.8× 1.3k 0.8× 1.7k 1.1× 539 1.1× 179 0.5× 45 2.6k
Andrew D. Gordon United Kingdom 13 1.3k 0.7× 761 0.5× 1.4k 1.0× 553 1.2× 208 0.6× 20 2.0k
Michael Merritt United States 24 2.1k 1.1× 985 0.6× 1.0k 0.7× 304 0.6× 80 0.2× 75 2.5k
Riccardo Focardi Italy 18 631 0.3× 505 0.3× 878 0.6× 259 0.5× 173 0.5× 96 1.3k
Jon Howell United States 23 1.6k 0.8× 1.4k 0.8× 1.3k 0.9× 186 0.4× 96 0.3× 57 2.9k
Michael Walfish United States 25 1.2k 0.6× 596 0.4× 1.1k 0.8× 176 0.4× 43 0.1× 47 1.9k
Mark R. Tuttle United States 16 864 0.4× 262 0.2× 616 0.4× 517 1.1× 64 0.2× 50 1.4k
Robert K. Cunningham United States 19 1.4k 0.7× 650 0.4× 1.0k 0.7× 34 0.1× 57 0.2× 40 1.9k

Countries citing papers authored by Gavin Lowe

Since Specialization
Citations

This map shows the geographic impact of Gavin Lowe's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Gavin Lowe with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Gavin Lowe more than expected).

Fields of papers citing papers by Gavin Lowe

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Gavin Lowe. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Gavin Lowe. The network helps show where Gavin Lowe may publish in the future.

Co-authorship network of co-authors of Gavin Lowe

This figure shows the co-authorship network connecting the top 25 collaborators of Gavin Lowe. A scholar is included among the top collaborators of Gavin Lowe based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Gavin Lowe. Gavin Lowe is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Lowe, Gavin. (2019). Discovering and correcting a deadlock in a channel implementation. Formal Aspects of Computing. 31(4). 411–419. 1 indexed citations
2.
Lowe, Gavin. (2016). Testing for linearizability. Concurrency and Computation Practice and Experience. 29(4). 11 indexed citations
3.
Lowe, Gavin, et al.. (2013). CSP-based counter abstraction for systems with node identifiers. Science of Computer Programming. 81. 3–52. 4 indexed citations
4.
Bate, Andrew & Gavin Lowe. (2012). A Debugger for Communicating Scala Objects. Oxford University Research Archive (ORA) (University of Oxford). 135–154.
5.
Lowe, Gavin. (2008). Specification of communicating processes: temporal logic versus refusals-based refinement. Formal Aspects of Computing. 20(3). 277–294. 15 indexed citations
6.
Lowe, Gavin, et al.. (2005). Using data-independence in the analysis of intrusion detection systems. Theoretical Computer Science. 340(1). 82–101. 8 indexed citations
7.
Lowe, Gavin, et al.. (2004). Analysing a stream authentication protocol using model checking. International Journal of Information Security. 3(1). 2–13. 4 indexed citations
8.
Lowe, Gavin, et al.. (2004). A hierarchy of failures-based models: theory and application. Theoretical Computer Science. 330(3). 407–438. 5 indexed citations
9.
Lowe, Gavin, et al.. (2003). On Distributed Security Transactions that Use Secure Transport Protocols. Oxford University Research Archive (ORA) (University of Oxford). 10 indexed citations
10.
Lowe, Gavin. (2003). Semantic models for information flow. Theoretical Computer Science. 315(1). 209–256. 6 indexed citations
11.
Ryan, Peter Y. A., Steve Schneider, Michael Goldsmith, Gavin Lowe, & Bill Roscoe. (2001). Modelling and analysis of security protocols. View. 153 indexed citations
12.
Lowe, Gavin, et al.. (1999). Safe Simplifying Transformations for Security Protocols.. Oxford University Research Archive (ORA) (University of Oxford). 32–43. 7 indexed citations
13.
Gorrieri, Roberto, Paul Syverson, Martı́n Abadi, et al.. (1998). Panel Introduction: Varieties of Authentication. Oxford University Research Archive (ORA) (University of Oxford). 79–82. 1 indexed citations
14.
Lowe, Gavin. (1996). Breaking and Fixing the Needham-Schroeder Public-Key Protocol using CSP and FDR. 1055. 147–166. 67 indexed citations
15.
Lowe, Gavin. (1996). Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR. Oxford University Research Archive (ORA) (University of Oxford). 17(3). 93–102. 359 indexed citations
16.
Lowe, Gavin, et al.. (1996). Proofs with graphs. Science of Computer Programming. 26(1-3). 197–216. 10 indexed citations
17.
Lowe, Gavin. (1995). Scheduling-Oriented Models for Real-Time Systems. The Computer Journal. 38(6). 443–456. 2 indexed citations
18.
Lowe, Gavin. (1995). Probabilistic and prioritized models of timed CSP. Theoretical Computer Science. 138(2). 315–352. 26 indexed citations
19.
Brinksma, Ed, Jim Davies, Rob Gerth, et al.. (1994). Verifying sequentially consistent memory. Data Archiving and Networked Services (DANS). 9444. 2 indexed citations
20.
Lowe, Gavin. (1993). Probabilities and Priorities in Timed CSP. Oxford University Research Archive (ORA) (University of Oxford). 20 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026