Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Catherine A.
    Last name: Meadows
    DBLP: 99/395
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 109  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Catherine A. Meadows.
    Languages for Formal Specification of Security Protocols.
    10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA 1997 (0) 1997
    Conference paper
    Catherine A. Meadows.
    A Procedure for Verifying Security Against Type Confusion Attacks.
    16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA 2003 (0) 2003
    Conference paper
    Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic.
    An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
    18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France 2005 (0) 2005
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985 1985 (0) 1985
    Conference paper
    Catherine A. Meadows.
    Using traces based on procedure calls to reason about composability.
    1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992 1992 (0) 1992
    Conference paper
    Catherine A. Meadows, Paul F. Syverson.
    Formalizing GDOI group key management requirements in NPATRL.
    ACM Conference on Computer and Communications Security 2001 (0) 2001
    Journal article
    Catherine A. Meadows.
    Introduction to ACM TISSEC special issue on CCS 2005.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2009
    Conference paper
    Catherine A. Meadows.
    Formal Verification of Cryptographic Protocols: A Survey.
    Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings 1995 (0) 1994
    Conference paper
    G. R. Blakley, Catherine A. Meadows, George B. Purdy.
    Fingerprinting Long Forgiving Messages.
    Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings 1986 (0) 1985
    Conference paper
    Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse.
    Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
    Automated Deduction - CADE-24 - 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings 2013 (0) 2013
    Show item 1 to 10 of 109  

    Your query returned 109 matches in the database.