Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Catherine A.
    Last name: Meadows
    DBLP: 99/395
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 110  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Catherine A. Meadows.
    A Cost-Based Framework for Analysis of Denial of Service Networks.
    Journal of Computer Security 2001, Volume 9 (0) 2001
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985 1985 (0) 1985
    Conference paper
    Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA.
    Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Catherine A. Meadows.
    A Formal Framework and Evaluation Method for Network Denial of Service.
    CSFW 1999 (0) 1999
    Conference paper
    Paul F. Syverson, Catherine A. Meadows.
    A Formal Language for Cryptographic Protocol Requirements.
    Des. Codes Cryptography 1996, Volume 7 (0) 1996
    Conference paper
    Catherine A. Meadows, Paul F. Syverson.
    A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
    Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings 1998 (0) 1998
    Journal article
    Sonia Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A Graphical User Interface for Maude-NPA.
    Electr. Notes Theor. Comput. Sci. 2009, Volume 258 (0) 2009
    Conference paper
    Catherine A. Meadows.
    A Model of Computation for the NRL Protocol Analyzer.
    CSFW 1994 (0) 1994
    Conference paper
    Catherine A. Meadows.
    A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
    IEEE Symposium on Security and Privacy 1986 (0) 1986
    Conference paper
    Catherine A. Meadows.
    A Procedure for Verifying Security Against Type Confusion Attacks.
    16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA 2003 (0) 2003
    Show item 1 to 10 of 110  

    Your query returned 110 matches in the database.