Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Catherine A.
    Last name: Meadows
    DBLP: 99/395
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 110  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Catherine A. Meadows.
    A Cost-Based Framework for Analysis of Denial of Service Networks.
    Journal of Computer Security 2001, Volume 9 (0) 2001
    Conference paper
    G. R. Blakley, Catherine A. Meadows.
    A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
    1985 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985 1985 (0) 1985
    Conference paper
    Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA.
    Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Catherine A. Meadows.
    A Formal Framework and Evaluation Method for Network Denial of Service.
    CSFW 1999 (0) 1999
    Conference paper
    Paul F. Syverson, Catherine A. Meadows.
    A Formal Language for Cryptographic Protocol Requirements.
    Des. Codes Cryptography 1996, Volume 7 (0) 1996
    Conference paper
    Catherine A. Meadows, Paul F. Syverson.
    A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
    Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings 1998 (0) 1998
    Journal article
    Sonia Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A Graphical User Interface for Maude-NPA.
    Electr. Notes Theor. Comput. Sci. 2009, Volume 258 (0) 2009
    Conference paper
    Catherine A. Meadows.
    A Model of Computation for the NRL Protocol Analyzer.
    CSFW 1994 (0) 1994
    Conference paper
    Catherine A. Meadows.
    A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
    IEEE Symposium on Security and Privacy 1986 (0) 1986
    Conference paper
    Catherine A. Meadows.
    A Procedure for Verifying Security Against Type Confusion Attacks.
    16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June - 2 July 2003, Pacific Grove, CA, USA 2003 (0) 2003
    Conference paper
    Catherine A. Meadows.
    A representation of protocol attacks for risk assessment.
    Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996 1998 (0) 1996
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago.
    A rewriting-based forwards semantics for Maude-NPA.
    Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014 2014 (0) 2014
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
    Theor. Comput. Sci. 2006, Volume 367 (0) 2006
    Conference paper
    Santiago Escobar, Catherine A. Meadows, José Meseguer.
    A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
    Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 2005 (0) 2005
    Conference paper
    Catherine A. Meadows.
    A System for the Specification and Verification of Key Management Protocols.
    IEEE Symposium on Security and Privacy 1991 (0) 1991
    Conference paper
    Judith N. Froscher, Catherine A. Meadows.
    Achieving a Trusted Database Management System Using Parallelism.
    DBSec 1988 (0) 1988
    Conference paper
    Dusko Pavlovic, Catherine A. Meadows.
    Actor-Network Procedures - (Extended Abstract).
    Distributed Computing and Internet Technology - 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings 2012 (0) 2012
    Journal article
    Dusko Pavlovic, Catherine A. Meadows.
    Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
    CoRR 2011, Volume 0 (0) 2011
    Conference paper
    Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic.
    An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
    18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France 2005 (0) 2005
    Conference paper
    Catherine A. Meadows.
    An outline of a taxonomy of computer security research and development.
    Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA 1993 (0) 1993
    Conference paper
    Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Analysis of the IBM CCA Security API Protocols in Maude-NPA.
    Security Standardisation Research - First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Catherine A. Meadows.
    Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer.
    IEEE Symposium on Security and Privacy 1999 (0) 1999
    Conference paper
    Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer.
    Analysis of the PKCS#11 API Using the Maude-NPA Tool.
    Security Standardisation Research - Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings 2015 (0) 2015
    Conference paper
    Catherine A. Meadows.
    Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches.
    Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings 1996 (0) 1996
    Book chapter
    Catherine A. Meadows.
    Applications of Formal Methods to Intrusion Detection.
    Encyclopedia of Cryptography and Security, 2nd Ed. 2011 (0) 2011
    Show item 1 to 25 of 110  

    Your query returned 110 matches in the database.