Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Catherine A.
    Last name: Meadows
    DBLP: 99/395
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 85 to 109 of 109  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Paul F. Syverson, Catherine A. Meadows.
    Formal Requirements for Key Distribution Protocols.
    EUROCRYPT 1994 (0) 1994
    Conference paper
    Richard A. Kemmerer, Catherine A. Meadows, Jonathan K. Millen.
    Three System for Cryptographic Protocol Analysis.
    J. Cryptology 1994, Volume 7 (0) 1994
    Conference paper
    Catherine A. Meadows.
    An outline of a taxonomy of computer security research and development.
    Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA 1993 (0) 1993
    Conference paper
    Catherine A. Meadows.
    Using traces based on procedure calls to reason about composability.
    1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992 1992 (0) 1992
    Conference paper
    Catherine A. Meadows.
    Panel: Fundamental Questions about Formal Methods.
    CSFW 1992 (0) 1992
    Conference paper
    Catherine A. Meadows.
    Applying Formal Methods to the Analysis of a Key Management Protocol.
    Journal of Computer Security 1992, Volume 1 (0) 1992
    Conference paper
    Catherine A. Meadows.
    The NRL Protocol Analysis Tool: A Position Paper.
    CSFW 1991 (0) 1991
    Conference paper
    Catherine A. Meadows.
    Panel Discussion on the Polyinstantiation Problem: An Introduction.
    CSFW 1991 (0) 1991
    Conference paper
    Catherine A. Meadows.
    Discussion Summary.
    Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 1992 (0) 1991
    Conference paper
    Catherine A. Meadows.
    A System for the Specification and Verification of Key Management Protocols.
    IEEE Symposium on Security and Privacy 1991 (0) 1991
    Conference paper
    Catherine A. Meadows.
    Representing Partial Knowledge in an Algebraic Security Model.
    CSFW 1990 (0) 1990
    Conference paper
    Catherine A. Meadows.
    Policies for Dynamic Upgrading.
    DBSec 1990 (0) 1990
    Conference paper
    Catherine A. Meadows.
    Discussion Summary.
    DBSec 1990 (0) 1990
    Conference paper
    Catherine A. Meadows.
    Extending the Brewer-Nash Model to a Multilevel Context.
    IEEE Symposium on Security and Privacy 1990 (0) 1990
    Conference paper
    Catherine A. Meadows.
    Constructing Containers Using a Multilevel Relational Data Model.
    DBSec 1989 (0) 1989
    Conference paper
    Catherine A. Meadows.
    Using Narrowing in the Analysis of Key Management Protocols.
    IEEE Symposium on Security and Privacy 1989 (0) 1989
    Conference paper
    Judith N. Froscher, Catherine A. Meadows.
    Achieving a Trusted Database Management System Using Parallelism.
    DBSec 1988 (0) 1988
    Conference paper
    Catherine A. Meadows, Sushil Jajodia.
    Integrity Versus Security in Multi-Level Secure Databases.
    DBSec 1987 (0) 1987
    Conference paper
    Sushil Jajodia, Catherine A. Meadows.
    Mutual Consistency in Decentralized Distributed Systems.
    Proceedings of the Third International Conference on Data Engineering, February 3-5, 1987, Los Angeles, California, USA 1987 (0) 1987
    Conference paper
    Catherine A. Meadows.
    The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels.
    IEEE Symposium on Security and Privacy 1987 (0) 1987
    Conference paper
    Catherine A. Meadows, David Mutchler.
    Matching Secrets in the Absence of a Continuously Available Trusted Authority.
    IEEE Trans. Software Eng. 1987, Volume 13 (0) 1987
    Conference paper
    Catherine A. Meadows.
    A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
    IEEE Symposium on Security and Privacy 1986 (0) 1986
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985 1985 (0) 1985
    Conference paper
    G. R. Blakley, Catherine A. Meadows, George B. Purdy.
    Fingerprinting Long Forgiving Messages.
    Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings 1986 (0) 1985
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    Security of Ramp Schemes.
    CRYPTO 1984 (0) 1984
    Show item 85 to 109 of 109  

    Your query returned 109 matches in the database.