University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Lowe, G"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Jump to: Article | Book
Number of items: 5.

Article

Palmer, AL, Bradley, D, Nisbet, A, Diez, P, Gandon, L, Wynn-Jones, A, Bownes, P, Lee, C, Aird, E, Bidmead, M and Lowe, G (2015) A multicentre 'end to end' dosimetry audit for cervix HDR brachytherapy treatment Radiotherapy and Oncology, 114 (2). pp. 264-271.

Heather, J, Lowe, G and Schneider, S (2003) How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Heather, J, Lowe, G and Schneider, S (2003) How to prevent type flaw attacks on security protocols Journal of Computer Security, 11 (2). pp. 217-244.

Book

Ryan, P, Schneider, S, Goldsmith, M, Lowe, G and Roscoe, B (2001) Modelling and Analysis of Security Protocols Addison-Wesley. ISBN 0201674718

This list was generated on Mon Sep 25 06:30:24 2017 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800