Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Catherine A.
    Last name: Meadows
    DBLP: 99/395
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 26 to 50 of 110  
    Select a publication
    Show Title Venue Rating Date
    Book chapter
    Catherine A. Meadows.
    Type Checking and Security.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Catherine A. Meadows.
    Theorem Proving and Security.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Catherine A. Meadows.
    Formal Analysis of Cryptographic Protocols.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Conference paper
    Hubert Comon-Lundh, Ralf Küsters, Catherine A. Meadows.
    Security and Rewriting (Dagstuhl Seminar 11332).
    Dagstuhl Reports 2011, Volume 1 (0) 2011
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    Sequential Protocol Composition in Maude-NPA.
    Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings 2010 (0) 2010
    Journal article
    Dusko Pavlovic, Catherine A. Meadows.
    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol.
    Electr. Notes Theor. Comput. Sci. 2010, Volume 265 (0) 2010
    Conference paper
    Aaron D. Jaggard, Catherine A. Meadows, Michael Mislove, Roberto Segala.
    Reasoning about Probabilistic Security Using Task-PIOAs.
    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers 2011 (0) 2010
    Conference paper
    Ralf Sasse, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA.
    Security and Trust Management - 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Deriving Ephemeral Authentication Using Channel Axioms.
    Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers 2013 (0) 2009
    Conference paper
    Catherine A. Meadows.
    Deriving Ephemeral Authentication Using Channel Axioms.
    Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers 2013 (0) 2009
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol.
    CoRR 2009, Volume 0 (0) 2009
    Journal article
    Sonia Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A Graphical User Interface for Maude-NPA.
    Electr. Notes Theor. Comput. Sci. 2009, Volume 258 (0) 2009
    Journal article
    Catherine A. Meadows.
    Introduction to ACM TISSEC special issue on CCS 2005.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2009
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    State Space Reduction in the Maude-NRL Protocol Analyzer.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Catherine A. Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul F. Syverson.
    Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.
    Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007, Volume 30 (0) 2007
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties.
    Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures 2009 (0) 2007
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer.
    Electr. Notes Theor. Comput. Sci. 2007, Volume 171 (0) 2007
    Conference paper
    Iliano Cervesato, Catherine A. Meadows.
    One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements.
    IEEE Trans. Dependable Sec. Comput. 2007, Volume 4 (0) 2007
    Conference paper
    Catherine A. Meadows, Paul F. Syverson, LiWu Chang.
    Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks.
    Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, Aug. 28 2006 - September 1, 2006 2006 (0) 2006
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Deriving Secrecy in Key Establishment Protocols.
    Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
    Theor. Comput. Sci. 2006, Volume 367 (0) 2006
    Conference paper
    Loukas Lazos, Radha Poovendran, Catherine A. Meadows, Paul F. Syverson, LiWu Chang.
    Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
    IEEE Wireless Communications and Networking Conference, WCNC 2005, March 13-17, 2005, New Orleans, Louisiana, USA 2005 (0) 2005
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
    Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 2005 (0) 2005
    Conference paper
    Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic.
    An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
    18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France 2005 (0) 2005
    Conference paper
    Christopher Lynch, Catherine A. Meadows.
    On the Relative Soundness of the Free Algebra Model for Public Key Encryption.
    Electr. Notes Theor. Comput. Sci. 2005, Volume 125 (0) 2005
    Show item 26 to 50 of 110  

    Your query returned 110 matches in the database.