Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Catherine A.
    Last name: Meadows
    DBLP: 99/395
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 109  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Catherine A. Meadows.
    Languages for Formal Specification of Security Protocols.
    10th Computer Security Foundations Workshop (CSFW '97), June 10-12, 1997, Rockport, Massachusetts, USA 1997 (0) 1997
    Conference paper
    Catherine A. Meadows.
    A Procedure for Verifying Security Against Type Confusion Attacks.
    16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA 2003 (0) 2003
    Conference paper
    Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic.
    An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
    18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France 2005 (0) 2005
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985 1985 (0) 1985
    Conference paper
    Catherine A. Meadows.
    Using traces based on procedure calls to reason about composability.
    1992 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992 1992 (0) 1992
    Conference paper
    Catherine A. Meadows, Paul F. Syverson.
    Formalizing GDOI group key management requirements in NPATRL.
    ACM Conference on Computer and Communications Security 2001 (0) 2001
    Journal article
    Catherine A. Meadows.
    Introduction to ACM TISSEC special issue on CCS 2005.
    ACM Trans. Inf. Syst. Secur. 2010, Volume 13 (0) 2009
    Conference paper
    Catherine A. Meadows.
    Formal Verification of Cryptographic Protocols: A Survey.
    Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings 1995 (0) 1994
    Conference paper
    G. R. Blakley, Catherine A. Meadows, George B. Purdy.
    Fingerprinting Long Forgiving Messages.
    Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings 1986 (0) 1985
    Conference paper
    Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse.
    Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
    Automated Deduction - CADE-24 - 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Aaron D. Jaggard, Catherine A. Meadows, Michael Mislove, Roberto Segala.
    Reasoning about Probabilistic Security Using Task-PIOAs.
    Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers 2011 (0) 2010
    Conference paper
    Catherine A. Meadows.
    Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis.
    Computer Aided Verification, 12th International Conference, CAV 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings 2000 (0) 2000
    Conference paper
    Catherine A. Meadows, Dusko Pavlovic.
    Deriving, Attacking and Defending the GDOI Protocol.
    Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings 2004 (0) 2004
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Deriving Secrecy in Key Establishment Protocols.
    Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings 2006 (0) 2006
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    State Space Reduction in the Maude-NRL Protocol Analyzer.
    Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    Sequential Protocol Composition in Maude-NPA.
    Computer Security - ESORICS 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse.
    Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
    Computer Security - ESORICS 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Catherine A. Meadows.
    Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches.
    Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings 1996 (0) 1996
    Conference paper
    Olga Chen, Catherine A. Meadows, Gautam Trivedi.
    Stealthy Protocols: Metrics and Open Problems.
    Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday 2017 (0) 2017
    Journal article
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    State Space Reduction in the Maude-NRL Protocol Analyzer
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Dusko Pavlovic, Catherine A. Meadows.
    Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
    CoRR 2011, Volume 0 (0) 2011
    Journal article
    Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran.
    On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry.
    CoRR 2015, Volume 0 (0) 2015
    Journal article
    Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Effective Sequential Protocol Composition in Maude-NPA.
    CoRR 2016, Volume 0 (0) 2016
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    Security of Ramp Schemes.
    CRYPTO 1984 (0) 1984
    Conference paper
    Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine A. Meadows.
    Panel Introduction: Varieties of Authentication.
    CSFW 1998 (0) 1998
    Show item 1 to 25 of 109  

    Your query returned 109 matches in the database.