default search action
Catherine Meadows 0001
Person information
- affiliation: Naval Research Laboratory (NRL), Washington, DC, USA
Other persons with the same name
- Catherine Meadows 0002 — George Washington University, Washington, DC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c97]Aaron D. Jaggard, Paul Syverson, Catherine Meadows:
A Logic of Sattestation. CSF 2024: 356-371 - [i12]Aaron D. Jaggard, Paul Syverson, Catherine Meadows:
A Logic of Sattestation. CoRR abs/2405.01809 (2024) - 2023
- [c96]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Strand Spaces with Choice via a Process Algebra Semantics. Analysis, Verification and Transformation for Declarative Programming and Intelligent Systems 2023: 307-350 - [c95]D. Galán, Víctor García, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Protocol Dialects as Formal Patterns. ESORICS (2) 2023: 42-61 - 2022
- [c94]Catherine Meadows:
Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results. CODASPY 2022: 2-3 - [c93]Dalton Chichester, Wei Du, Raymond Kauffman, Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Luis Rovira, Brandon Rozek:
CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms. GandALF 2022: 147-161 - 2021
- [c92]Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time and Space. Protocols, Strands, and Logic 2021: 22-49 - [c91]Catherine Meadows:
Moving the Bar on Computationally Sound Exclusive-Or. ESORICS (2) 2021: 275-295 - [c90]Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Brandon Rozek:
Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems. FroCoS 2021: 253-270 - 2020
- [c89]Olga Chen, Aaron D. Jaggard, Catherine Meadows, Michael C. Shlanta:
NExtSteP: An Extensible Testbed for Network Covert Channels. CNS 2020: 1-9 - [c88]Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time. INDOCRYPT 2020: 128-150 - [c87]Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar, Brandon Rozek:
Algorithmic Problems in Synthesized Cryptosystems (Extended Abstract). UNIF 2020: 10:1-10:6 - [i11]Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time. CoRR abs/2010.13707 (2020) - [i10]Catherine Meadows:
Symbolic and Computational Reasoning About Cryptographic Modes of Operation. IACR Cryptol. ePrint Arch. 2020: 794 (2020)
2010 – 2019
- 2019
- [c86]Christopher Lynch, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar:
On Asymmetric Unification for the Theory of XOR with a Homomorphism. FroCos 2019: 297-312 - [i9]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer:
Strand Spaces with Choice via a Process Algebra Semantics. CoRR abs/1904.09946 (2019) - [i8]Christopher Lynch, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar:
On Asymmetric Unification for the Theory of XOR with a Homomorphism. CoRR abs/1907.00227 (2019) - 2018
- [c85]Antonio González-Burgueño, Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer:
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA. LPAR 2018: 400-417 - [c84]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer:
Modular Verification of Sequential Composition for Private Channels in Maude-NPA. STM 2018: 20-36 - [p2]David A. Basin, Cas Cremers, Catherine Meadows:
Model Checking Security Protocols. Handbook of Model Checking 2018: 727-762 - [i7]Antonio González-Burgueño, Damián Aparicio, Santiago Escobar, Catherine Meadows, José Meseguer:
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA. CoRR abs/1806.07209 (2018) - 2017
- [c83]Olga Chen, Catherine Meadows, Gautam Trivedi:
Stealthy Protocols: Metrics and Open Problems. Concurrency, Security, and Puzzles 2017: 1-17 - [i6]Catherine Meadows:
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption. IACR Cryptol. ePrint Arch. 2017: 1152 (2017) - 2016
- [c82]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Strand spaces with choice via a process algebra semantics. PPDP 2016: 76-89 - [e9]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9878, Springer 2016, ISBN 978-3-319-45743-7 [contents] - [e8]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9879, Springer 2016, ISBN 978-3-319-45740-6 [contents] - [i5]Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
Effective Sequential Protocol Composition in Maude-NPA. CoRR abs/1603.00087 (2016) - 2015
- [j20]Andrew M. Marshall, Catherine Meadows, Paliath Narendran:
On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry. Log. Methods Comput. Sci. 11(2) (2015) - [c81]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories. Programming Languages with Applications to Biology and Security 2015: 238-261 - [c80]Catherine Meadows:
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later. Logic, Rewriting, and Concurrency 2015: 475-492 - [c79]Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
Analysis of the PKCS#11 API Using the Maude-NPA Tool. SSR 2015: 86-106 - 2014
- [j19]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
State space reduction in the Maude-NRL Protocol Analyzer. Inf. Comput. 238: 157-186 (2014) - [c78]Serdar Erbatur, Deepak Kapur, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Christophe Ringeissen:
On Asymmetric Unification and the Combination Problem in Disjoint Theories. FoSSaCS 2014: 274-288 - [c77]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
A rewriting-based forwards semantics for Maude-NPA. HotSoS 2014: 3 - [c76]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer, Paliath Narendran:
Theories of Homomorphic Encryption, Unification, and the Finite Variant Property. PPDP 2014: 123-133 - [c75]Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
Analysis of the IBM CCA Security API Protocols in Maude-NPA. SSR 2014: 111-130 - [c74]Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA. STM 2014: 162-177 - [c73]Serdar Erbatur, Deepak Kapur, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Christophe Ringeissen:
On Asymmetric Unification and the Combination Problem in Disjoint Theories (Extended Abstract). UNIF 2014: 33-35 - 2013
- [c72]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. CADE 2013: 231-248 - 2012
- [j18]Hubert Comon-Lundh, Catherine Meadows:
Special Issue on Security and Rewriting Foreword. J. Autom. Reason. 48(2): 133-134 (2012) - [c71]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. ESORICS 2012: 73-90 - [c70]Dusko Pavlovic, Catherine Meadows:
Actor-Network Procedures - (Extended Abstract). ICDCIT 2012: 7-26 - [c69]Catherine Meadows, Dusko Pavlovic:
Formalizing Physical Security Procedures. STM 2012: 193-208 - [c68]Stephen D. Brookes, Achim Jung, Catherine Meadows, Michael W. Mislove, Prakash Panangaden:
Dedication. MFPS 2012: 3 - [e7]Catherine Meadows, M. Carmen Fernández Gago:
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7170, Springer 2012, ISBN 978-3-642-29962-9 [contents] - 2011
- [c67]Santiago Escobar, Deepak Kapur, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. PPDP 2011: 65-76 - [c66]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. UNIF 2011: 59-64 - [r6]Catherine Meadows:
Applications of Formal Methods to Intrusion Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 44-45 - [r5]Catherine Meadows:
Formal Analysis of Cryptographic Protocols. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 490-492 - [r4]Catherine Meadows:
Formal Methods in Certification and Evaluation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 498-499 - [r3]Catherine Meadows:
Program Verification and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 981-983 - [r2]Catherine Meadows:
Theorem Proving and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1285-1287 - [r1]Catherine Meadows:
Type Checking and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1342-1343 - [i4]Santiago Escobar, Catherine Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. CoRR abs/1105.5282 (2011) - [i3]Dusko Pavlovic, Catherine Meadows:
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions. CoRR abs/1106.0706 (2011) - [i2]Hubert Comon-Lundh, Ralf Küsters, Catherine Meadows:
Security and Rewriting (Dagstuhl Seminar 11332). Dagstuhl Reports 1(8): 53-66 (2011) - 2010
- [c65]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Sequential Protocol Composition in Maude-NPA. ESORICS 2010: 303-318 - [c64]Aaron D. Jaggard, Catherine Meadows, Michael W. Mislove, Roberto Segala:
Reasoning about Probabilistic Security Using Task-PIOAs. ARSPA-WITS 2010: 2-22 - [c63]Ralf Sasse, Santiago Escobar, Catherine Meadows, José Meseguer:
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. STM 2010: 163-178 - [c62]Dusko Pavlovic, Catherine Meadows:
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. MFPS 2010: 97-122
2000 – 2009
- 2009
- [j17]Catherine Meadows:
Introduction to ACM TISSEC special issue on CCS 2005. ACM Trans. Inf. Syst. Secur. 13(1): 1:1-1:2 (2009) - [c61]Dusko Pavlovic, Catherine Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 240-261 - [c60]Catherine Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 262-268 - [c59]Sonia Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine Meadows, José Meseguer:
A Graphical User Interface for Maude-NPA. PROLE 2009: 3-20 - [i1]Dusko Pavlovic, Catherine Meadows:
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol. CoRR abs/0910.5745 (2009) - 2008
- [c58]Santiago Escobar, Catherine Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. ESORICS 2008: 548-562 - 2007
- [j16]Iliano Cervesato, Catherine Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. IEEE Trans. Dependable Secur. Comput. 4(3): 216-227 (2007) - [c57]Santiago Escobar, Catherine Meadows, José Meseguer:
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. FOSAD 2007: 1-50 - [p1]Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul F. Syverson:
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 279-298 - [e6]Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7 [contents] - 2006
- [j15]Santiago Escobar, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1-2): 162-202 (2006) - [c56]Dusko Pavlovic, Catherine Meadows:
Deriving Secrecy in Key Establishment Protocols. ESORICS 2006: 384-403 - [c55]Catherine Meadows, Paul F. Syverson, LiWu Chang:
Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks. SecureComm 2006: 1-5 - [c54]Santiago Escobar, Catherine Meadows, José Meseguer:
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. SecReT@ICALP 2006: 23-36 - 2005
- [c53]Santiago Escobar, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL protocol analyzer: grammar generation. FMSE 2005: 1-12 - [c52]Iliano Cervesato, Catherine Meadows, Dusko Pavlovic:
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. CSFW 2005: 48-61 - [c51]Loukas Lazos, Radha Poovendran, Catherine Meadows, Paul F. Syverson, LiWu Chang:
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. WCNC 2005: 1193-1199 - [e5]Vijay Atluri, Catherine Meadows, Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. ACM 2005, ISBN 1-59593-226-7 [contents] - [e4]Catherine Meadows:
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005. ACM 2005, ISBN 1-58113-980-2 [contents] - 2004
- [j14]Catherine Meadows, Paul F. Syverson, Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. J. Comput. Secur. 12(6): 893-931 (2004) - [j13]Catherine Meadows:
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. Sci. Comput. Program. 50(1-3): 3-22 (2004) - [c50]Catherine Meadows, Dusko Pavlovic:
Deriving, Attacking and Defending the GDOI Protocol. ESORICS 2004: 53-72 - [c49]Christopher Lynch, Catherine Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules. ICICS 2004: 262-277 - [c48]Christopher Lynch, Catherine Meadows:
On the Relative Soundness of the Free Algebra Model for Public Key Encryption. ARSPA@IJCAR 2004: 43-54 - 2003
- [j12]Catherine Meadows:
Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1): 44-54 (2003) - [c47]Michael Backes, Catherine Meadows, John C. Mitchell:
Relating cryptography and formal methods: a panel. FMSE 2003: 61-66 - [c46]Catherine Meadows:
A Procedure for Verifying Security Against Type Confusion Attacks. CSFW 2003: 62- - [c45]Catherine Meadows:
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. ESOP 2003: 10-21 - 2002
- [c44]Ran Canetti, Catherine Meadows, Paul F. Syverson:
Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355 - [c43]Catherine Meadows:
Using a Declarative Language to Build an Experimental Analysis Tool. PADL 2002: 1-2 - 2001
- [j11]Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto:
Editorial. Int. J. Inf. Sec. 1(1): 1-2 (2001) - [j10]Catherine Meadows:
A Cost-Based Framework for Analysis of Denial of Service Networks. J. Comput. Secur. 9(1/2): 143-164 (2001) - [c42]Catherine Meadows, Paul F. Syverson:
Formalizing GDOI group key management requirements in NPATRL. CCS 2001: 235-244 - [c41]Catherine Meadows:
Open Issues in Formal Methods for Cryptographic Protocol Analysis. MMM-ACNS 2001: 21 - [c40]Catherine Meadows:
Experiences in the Formal Analysis of the Group Domain of Interpretation Protocol (GDOI). VIS 2001: 147-150 - 2000
- [j9]Stuart G. Stubblebine, Catherine A. Meadows:
Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE J. Sel. Areas Commun. 18(4): 571-581 (2000) - [c39]Catherine Meadows:
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. CAV 2000: 2 - [c38]Catherine Meadows:
Invariant Generation Techniques in Cryptographic Protocol Analysis. CSFW 2000: 159-167
1990 – 1999
- 1999
- [j8]Catherine Meadows, William H. Sanders:
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). IEEE Trans. Software Eng. 25(5): 601-602 (1999) - [c37]Catherine Meadows:
A Formal Framework and Evaluation Method for Network Denial of Service. CSFW 1999: 4-13 - [c36]Catherine Meadows:
Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. S&P 1999: 216-231 - [c35]Catherine Meadows, Dennis M. Volpano:
The MFPS XV Security Session. MFPS 1999: 76-79 - 1998
- [c34]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c33]Catherine Meadows, Paul F. Syverson:
A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140 - [e3]Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [c32]Catherine Meadows:
Languages for Formal Specification of Security Protocols. CSFW 1997: 96-97 - [c31]Catherine Meadows:
Three paradigms in computer security. NSPW 1997: 34-37 - 1996
- [j7]Paul F. Syverson, Catherine Meadows:
A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptogr. 7(1-2): 27-59 (1996) - [j6]Catherine Meadows:
The NRL Protocol Analyzer: An Overview. J. Log. Program. 26(2): 113-131 (1996) - [j5]Catherine Meadows:
Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. IEEE Trans. Software Eng. 22(5): 281-282 (1996) - [c30]Catherine Meadows:
Language generation and verification in the NRL protocol analyzer. CSFW 1996: 48-61 - [c29]Catherine Meadows:
A representation of protocol attacks for risk assessment. Network Threats 1996: 1-10 - [c28]Catherine A. Meadows:
Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. ESORICS 1996: 351-364 - [c27]Catherine Meadows, Ira S. Moskowitz:
Covert Channels - A Context-Based View. Information Hiding 1996: 73-93 - 1995
- [j4]Gustavus J. Simmons, Catherine Meadows:
The Role of Trust in Information Integrity Protocols. J. Comput. Secur. 3(1): 71-84 (1995) - [c26]Catherine Meadows:
Applying the dependability paradigm to computer security. NSPW 1995: 75-79 - [e2]Hilary H. Hosmer, John E. Dobson, Catherine Meadows:
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA. IEEE Computer Society 1995, ISBN 0-8186-7318-4 [contents] - 1994
- [j3]Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis. J. Cryptol. 7(2): 79-130 (1994) - [c25]Catherine A. Meadows:
Formal Verification of Cryptographic Protocols: A Survey. ASIACRYPT 1994: 135-150 - [c24]Catherine Meadows:
A Model of Computation for the NRL Protocol Analyzer. CSFW 1994: 84-89 - [c23]Paul F. Syverson, Catherine Meadows:
Formal Requirements for Key Distribution Protocols. EUROCRYPT 1994: 320-331 - 1993
- [c22]Catherine Meadows:
An outline of a taxonomy of computer security research and development. NSPW 1993: 33-35 - [c21]Paul Syverson, Catherine Meadows:
A logical language for specifying cryptographic protocol requirements. S&P 1993: 165-177 - [e1]James Bret Michael, Victoria Ashby, Catherine Meadows:
Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA. ACM 1993, ISBN 0-8186-5430-9 [contents] - 1992
- [j2]Catherine Meadows:
Applying Formal Methods to the Analysis of a Key Management Protocol. J. Comput. Secur. 1(1): 5-36 (1992) - [c20]Catherine Meadows:
Panel: Fundamental Questions about Formal Methods. CSFW 1992: 52 - [c19]Catherine Meadows:
Using traces based on procedure calls to reason about composability. S&P 1992: 177-188 - 1991
- [c18]Catherine Meadows:
The NRL Protocol Analysis Tool: A Position Paper. CSFW 1991: 227 - [c17]Catherine Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction. CSFW 1991: 234 - [c16]Catherine Meadows:
Discussion Summary. DBSec 1991: 387-397 - [c15]Catherine Meadows:
A System for the Specification and Verification of Key Management Protocols. S&P 1991: 182-197 - 1990
- [c14]Catherine Meadows:
Representing Partial Knowledge in an Algebraic Security Model. CSFW 1990: 23-31 - [c13]Catherine Meadows:
Policies for Dynamic Upgrading. DBSec 1990: 241-250 - [c12]Catherine Meadows:
Discussion Summary. DBSec 1990: 395-404 - [c11]Catherine Meadows:
Extending the Brewer-Nash Model to a Multilevel Context. S&P 1990: 95-103
1980 – 1989
- 1989
- [c10]Catherine Meadows:
Constructing Containers Using a Multilevel Relational Data Model. DBSec 1989: 127-141 - [c9]Catherine Meadows:
Using Narrowing in the Analysis of Key Management Protocols. S&P 1989: 138-147 - 1988
- [c8]Judith N. Froscher, Catherine Meadows:
Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160 - 1987
- [j1]Catherine Meadows, David Mutchler:
Matching Secrets in the Absence of a Continuously Available Trusted Authority. IEEE Trans. Software Eng. 13(2): 289-292 (1987) - [c7]Catherine Meadows, Sushil Jajodia:
Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101 - [c6]Sushil Jajodia, Catherine A. Meadows:
Mutual Consistency in Decentralized Distributed Systems. ICDE 1987: 396-404 - [c5]Catherine Meadows:
The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. S&P 1987: 212-219 - 1986
- [c4]Catherine Meadows:
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. S&P 1986: 134-137 - 1985
- [c3]G. R. Blakley, Catherine Meadows, George B. Purdy:
Fingerprinting Long Forgiving Messages. CRYPTO 1985: 180-189 - [c2]G. R. Blakley, Catherine Meadows:
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data. S&P 1985: 116-122 - 1984
- [c1]G. R. Blakley, Catherine Meadows:
Security of Ramp Schemes. CRYPTO 1984: 242-268
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-02 21:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint