Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Catherine A.
    Last name: Meadows
    DBLP: 99/395
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 100 of 110  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Catherine A. Meadows.
    Languages for Formal Specification of Security Protocols.
    10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA 1997 (0) 1997
    Conference paper
    Catherine A. Meadows.
    A Procedure for Verifying Security Against Type Confusion Attacks.
    16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA 2003 (0) 2003
    Conference paper
    Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic.
    An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
    18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France 2005 (0) 2005
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985 1985 (0) 1985
    Conference paper
    Catherine A. Meadows.
    Using traces based on procedure calls to reason about composability.
    1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992 1992 (0) 1992
    Conference paper
    Catherine A. Meadows, Paul F. Syverson.
    Formalizing GDOI group key management requirements in NPATRL.
    ACM Conference on Computer and Communications Security 2001 (0) 2001
    Journal article
    Catherine A. Meadows.
    Introduction to ACM TISSEC special issue on CCS 2005.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2009
    Conference paper
    Catherine A. Meadows.
    Formal Verification of Cryptographic Protocols: A Survey.
    Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings 1995 (0) 1994
    Conference paper
    G. R. Blakley, Catherine A. Meadows, George B. Purdy.
    Fingerprinting Long Forgiving Messages.
    Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings 1986 (0) 1985
    Conference paper
    Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse.
    Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
    Automated Deduction - CADE-24 - 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Aaron D. Jaggard, Catherine A. Meadows, Michael Mislove, Roberto Segala.
    Reasoning about Probabilistic Security Using Task-PIOAs.
    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers 2011 (0) 2010
    Conference paper
    Catherine A. Meadows.
    Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis.
    Computer Aided Verification, 12th International Conference, CAV 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings 2000 (0) 2000
    Conference paper
    Catherine A. Meadows, Dusko Pavlovic.
    Deriving, Attacking and Defending the GDOI Protocol.
    Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings 2004 (0) 2004
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Deriving Secrecy in Key Establishment Protocols.
    Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    State Space Reduction in the Maude-NRL Protocol Analyzer.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    Sequential Protocol Composition in Maude-NPA.
    Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse.
    Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
    Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Catherine A. Meadows.
    Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches.
    Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings 1996 (0) 1996
    Conference paper
    Olga Chen, Catherine A. Meadows, Gautam Trivedi.
    Stealthy Protocols: Metrics and Open Problems.
    Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday 2017 (0) 2017
    Journal article
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    State Space Reduction in the Maude-NRL Protocol Analyzer
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Dusko Pavlovic, Catherine A. Meadows.
    Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran.
    On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Effective Sequential Protocol Composition in Maude-NPA.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol.
    CoRR 2009, Volume 0 (0) 2009
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    Security of Ramp Schemes.
    CRYPTO 1984 (0) 1984
    Conference paper
    Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine A. Meadows.
    Panel Introduction: Varieties of Authentication.
    CSFW 1998 (0) 1998
    Conference paper
    Catherine A. Meadows.
    A Formal Framework and Evaluation Method for Network Denial of Service.
    CSFW 1999 (0) 1999
    Conference paper
    Catherine A. Meadows.
    Invariant Generation Techniques in Cryptographic Protocol Analysis.
    CSFW 2000 (0) 2000
    Conference paper
    Catherine A. Meadows.
    Representing Partial Knowledge in an Algebraic Security Model.
    CSFW 1990 (0) 1990
    Conference paper
    Catherine A. Meadows.
    The NRL Protocol Analysis Tool: A Position Paper.
    CSFW 1991 (0) 1991
    Conference paper
    Catherine A. Meadows.
    Panel Discussion on the Polyinstantiation Problem: An Introduction.
    CSFW 1991 (0) 1991
    Conference paper
    Catherine A. Meadows.
    Panel: Fundamental Questions about Formal Methods.
    CSFW 1992 (0) 1992
    Conference paper
    Catherine A. Meadows.
    A Model of Computation for the NRL Protocol Analyzer.
    CSFW 1994 (0) 1994
    Conference paper
    Hubert Comon-Lundh, Ralf Küsters, Catherine A. Meadows.
    Security and Rewriting (Dagstuhl Seminar 11332).
    Dagstuhl Reports 2011, Volume 1 (0) 2011
    Conference paper
    Catherine A. Meadows.
    Discussion Summary.
    Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 1992 (0) 1991
    Conference paper
    Judith N. Froscher, Catherine A. Meadows.
    Achieving a Trusted Database Management System Using Parallelism.
    DBSec 1988 (0) 1988
    Conference paper
    Catherine A. Meadows.
    Constructing Containers Using a Multilevel Relational Data Model.
    DBSec 1989 (0) 1989
    Conference paper
    Catherine A. Meadows.
    Policies for Dynamic Upgrading.
    DBSec 1990 (0) 1990
    Conference paper
    Catherine A. Meadows.
    Discussion Summary.
    DBSec 1990 (0) 1990
    Conference paper
    Catherine A. Meadows, Sushil Jajodia.
    Integrity Versus Security in Multi-Level Secure Databases.
    DBSec 1987 (0) 1987
    Conference paper
    Paul F. Syverson, Catherine A. Meadows.
    A Formal Language for Cryptographic Protocol Requirements.
    Des. Codes Cryptography 1996, Volume 7 (0) 1996
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Actor-Network Procedures - (Extended Abstract).
    Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Christopher Lynch, Catherine A. Meadows.
    On the Relative Soundness of the Free Algebra Model for Public Key Encryption.
    Electr. Notes Theor. Comput. Sci. 2005, Volume 125 (0) 2005
    Conference paper
    Catherine A. Meadows, Dennis M. Volpano.
    The MFPS XV Security Session.
    Electr. Notes Theor. Comput. Sci. 1999, Volume 20 (0) 1999
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer.
    Electr. Notes Theor. Comput. Sci. 2007, Volume 171 (0) 2007
    Journal article
    Sonia Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A Graphical User Interface for Maude-NPA.
    Electr. Notes Theor. Comput. Sci. 2009, Volume 258 (0) 2009
    Journal article
    Dusko Pavlovic, Catherine A. Meadows.
    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol.
    Electr. Notes Theor. Comput. Sci. 2010, Volume 265 (0) 2010
    Journal article
    Stephen D. Brookes, Achim Jung, Catherine A. Meadows, Michael W. Mislove, Prakash Panangaden.
    Dedication.
    Electr. Notes Theor. Comput. Sci. 2012, Volume 286 (0) 2012
    Book chapter
    Catherine A. Meadows.
    Applications of Formal Methods to Intrusion Detection.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Catherine A. Meadows.
    Formal Methods in Certification and Evaluation.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Catherine A. Meadows.
    Program Verification and Security.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Catherine A. Meadows.
    Type Checking and Security.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Catherine A. Meadows.
    Theorem Proving and Security.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Book chapter
    Catherine A. Meadows.
    Formal Analysis of Cryptographic Protocols.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Conference paper
    Paul F. Syverson, Catherine A. Meadows.
    Formal Requirements for Key Distribution Protocols.
    EUROCRYPT 1994 (0) 1994
    Conference paper
    Catherine A. Meadows, Paul F. Syverson.
    A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
    Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings 1998 (0) 1998
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties.
    Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures 2009 (0) 2007
    Conference paper
    Serdar Erbatur, Deepak Kapur, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Christophe Ringeissen.
    On Asymmetric Unification and the Combination Problem in Disjoint Theories.
    Foundations of Software Science and Computation Structures - 17th International Conference, FOSSACS 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings 2014 (0) 2014
    Journal article
    Catherine A. Meadows.
    Formal methods for cryptographic protocol analysis: emerging issues and trends.
    IEEE Journal on Selected Areas in Communications 2003, Volume 21 (0) 2003
    Conference paper
    Stuart G. Stubblebine, Catherine A. Meadows.
    Formal characterization and automated analysis of known-pair and chosen-text attacks.
    IEEE Journal on Selected Areas in Communications 2000, Volume 18 (0) 2000
    Conference paper
    Catherine A. Meadows.
    A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
    IEEE Symposium on Security and Privacy 1986 (0) 1986
    Conference paper
    Catherine A. Meadows.
    The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels.
    IEEE Symposium on Security and Privacy 1987 (0) 1987
    Conference paper
    Catherine A. Meadows.
    Using Narrowing in the Analysis of Key Management Protocols.
    IEEE Symposium on Security and Privacy 1989 (0) 1989
    Conference paper
    Catherine A. Meadows.
    Extending the Brewer-Nash Model to a Multilevel Context.
    IEEE Symposium on Security and Privacy 1990 (0) 1990
    Conference paper
    Catherine A. Meadows.
    A System for the Specification and Verification of Key Management Protocols.
    IEEE Symposium on Security and Privacy 1991 (0) 1991
    Conference paper
    Catherine A. Meadows.
    Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer.
    IEEE Symposium on Security and Privacy 1999 (0) 1999
    Conference paper
    Iliano Cervesato, Catherine A. Meadows.
    One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements.
    IEEE Trans. Dependable Sec. Comput. 2007, Volume 4 (0) 2007
    Conference paper
    Catherine A. Meadows.
    Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy.
    IEEE Trans. Software Eng. 1996, Volume 22 (0) 1996
    Conference paper
    Catherine A. Meadows, David Mutchler.
    Matching Secrets in the Absence of a Continuously Available Trusted Authority.
    IEEE Trans. Software Eng. 1987, Volume 13 (0) 1987
    Conference paper
    Catherine A. Meadows, William H. Sanders.
    Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6).
    IEEE Trans. Software Eng. 1999, Volume 25 (0) 1999
    Conference paper
    Loukas Lazos, Radha Poovendran, Catherine A. Meadows, Paul F. Syverson, LiWu Chang.
    Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
    IEEE Wireless Communications and Networking Conference, WCNC 2005, March 13-17, 2005, New Orleans, Louisiana, USA 2005 (0) 2005
    Journal article
    Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    State space reduction in the Maude-NRL Protocol Analyzer.
    Inf. Comput. 2014, Volume 238 (0) 2014
    Conference paper
    Christopher Lynch, Catherine A. Meadows.
    Sound Approximations to Diffie-Hellman Using Rewrite Rules.
    Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings 2004 (0) 2004
    Conference paper
    Catherine A. Meadows.
    Open Issues in Formal Methods for Cryptographic Protocol Analysis.
    Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings 2001 (0) 2001
    Conference paper
    Catherine A. Meadows, Ira S. Moskowitz.
    Covert Channels - A Context-Based View.
    Information Hiding, First International Workshop, Cambridge, U.K., May 30 - June 1, 1996, Proceedings 1996 (0) 1996
    Conference paper
    Hubert Comon-Lundh, Catherine A. Meadows.
    Special Issue on Security and Rewriting Foreword.
    J. Autom. Reasoning 2012, Volume 48 (0) 2012
    Conference paper
    Richard A. Kemmerer, Catherine A. Meadows, Jonathan K. Millen.
    Three System for Cryptographic Protocol Analysis.
    J. Cryptology 1994, Volume 7 (0) 1994
    Conference paper
    Catherine A. Meadows.
    The NRL Protocol Analyzer: An Overview.
    J. Log. Program. 1996, Volume 26 (0) 1996
    Conference paper
    Catherine A. Meadows.
    A Cost-Based Framework for Analysis of Denial of Service Networks.
    Journal of Computer Security 2001, Volume 9 (0) 2001
    Conference paper
    Catherine A. Meadows.
    Applying Formal Methods to the Analysis of a Key Management Protocol.
    Journal of Computer Security 1992, Volume 1 (0) 1992
    Conference paper
    Catherine A. Meadows, Paul F. Syverson, Iliano Cervesato.
    Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer.
    Journal of Computer Security 2004, Volume 12 (0) 2004
    Conference paper
    Gustavus J. Simmons, Catherine A. Meadows.
    The Role of Trust in Information Integrity Protocols.
    Journal of Computer Security 1995, Volume 3 (0) 1995
    Conference paper
    Catherine A. Meadows.
    Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later.
    Logic, Rewriting, and Concurrency - Essays dedicated to José Meseguer on the Occasion of His 65th Birthday 2015 (0) 2015
    Conference paper
    Catherine A. Meadows.
    A representation of protocol attacks for risk assessment.
    Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996 1998 (0) 1996
    Conference paper
    Catherine A. Meadows.
    Language generation and verification in the NRL protocol analyzer.
    Ninth IEEE Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland 1996 (0) 1996
    Conference paper
    Catherine A. Meadows.
    Using a Declarative Language to Build an Experimental Analysis Tool.
    Practical Aspects of Declarative Languages, 4th International Symposium, PADL 2002, Portland, OR, USA, January 19-20, 2002, Proceedings 2002 (0) 2002
    Conference paper
    Santiago Escobar, Deepak Kapur, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Ralf Sasse.
    Protocol analysis in Maude-NPA using unification modulo homomorphic encryption.
    Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 20-22, 2011, Odense, Denmark 2011 (0) 2011
    Conference paper
    Fan Yang, Santiago Escobar, Catherine A. Meadows, José Meseguer, Paliath Narendran.
    Theories of Homomorphic Encryption, Unification, and the Finite Variant Property.
    Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, Kent, Canterbury, United Kingdom, September 8-10, 2014 2014 (0) 2014
    Conference paper
    Fan Yang, Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    Strand spaces with choice via a process algebra semantics.
    Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, Edinburgh, United Kingdom, September 5-7, 2016 2016 (0) 2016
    Conference paper
    Catherine A. Meadows.
    Applying the dependability paradigm to computer security.
    Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA 1995 (0) 1995
    Conference paper
    Catherine A. Meadows.
    Three paradigms in computer security.
    Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997 1997 (0) 1997
    Conference paper
    Michael Backes, Catherine A. Meadows, John C. Mitchell.
    Relating cryptography and formal methods: a panel.
    Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003 2003 (0) 2003
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
    Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 2005 (0) 2005
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    A rewriting-based forwards semantics for Maude-NPA.
    Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014 2014 (0) 2014
    Conference paper
    Sushil Jajodia, Catherine A. Meadows.
    Mutual Consistency in Decentralized Distributed Systems.
    Proceedings of the Third International Conference on Data Engineering, February 3-5, 1987, Los Angeles, California, USA 1987 (0) 1987
    Conference paper
    Catherine A. Meadows.
    An outline of a taxonomy of computer security research and development.
    Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA 1993 (0) 1993
    Conference paper
    Catherine A. Meadows.
    What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis.
    Programming Languages and Systems, 12th European Symposium on Programming, ESOP 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2003, Warsaw, Poland, April 7-11, 2003, Proceedings 2003 (0) 2003
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories.
    Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday 2015 (0) 2015
    Conference paper
    Catherine A. Meadows.
    Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols.
    Sci. Comput. Program. 2004, Volume 50 (0) 2004
    Conference paper
    Catherine A. Meadows, Paul F. Syverson, LiWu Chang.
    Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks.
    Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, Aug. 28 2006 - September 1, 2006 2006 (0) 2006
    Show item 1 to 100 of 110  

    Your query returned 110 matches in the database.