The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Catherine Meadows: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Catherine Meadows, Sushil Jajodia
    Integrity Versus Security in Multi-Level Secure Databases. [Citation Graph (7, 0)][DBLP]
    DBSec, 1987, pp:89-101 [Conf]
  2. Sushil Jajodia, Catherine Meadows
    Mutual Consistency in Decentralized Distributed Systems. [Citation Graph (4, 10)][DBLP]
    ICDE, 1987, pp:396-404 [Conf]
  3. Judith N. Froscher, Catherine Meadows
    Achieving a Trusted Database Management System Using Parallelism. [Citation Graph (2, 0)][DBLP]
    DBSec, 1988, pp:151-160 [Conf]
  4. Catherine Meadows
    Formal Verification of Cryptographic Protocols: A Survey. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:135-150 [Conf]
  5. Catherine Meadows
    Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CAV, 2000, pp:2- [Conf]
  6. Michael Backes, Catherine Meadows, John C. Mitchell
    Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:61-66 [Conf]
  7. Santiago Escobar, Catherine Meadows, José Meseguer
    A rewriting-based inference system for the NRL protocol analyzer: grammar generation. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:1-12 [Conf]
  8. Catherine Meadows, Paul F. Syverson
    Formalizing GDOI group key management requirements in NPATRL. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:235-244 [Conf]
  9. G. R. Blakley, Catherine Meadows
    Security of Ramp Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1984, pp:242-268 [Conf]
  10. G. R. Blakley, Catherine Meadows, George B. Purdy
    Fingerprinting Long Forgiving Messages. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:180-189 [Conf]
  11. Iliano Cervesato, Catherine Meadows, Dusko Pavlovic
    An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 2005, pp:48-61 [Conf]
  12. Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows
    Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:79-82 [Conf]
  13. Catherine Meadows
    Languages for Formal Specification of Security Protocols. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:96-97 [Conf]
  14. Catherine Meadows
    A Formal Framework and Evaluation Method for Network Denial of Service. [Citation Graph (0, 0)][DBLP]
    CSFW, 1999, pp:4-13 [Conf]
  15. Catherine Meadows
    Invariant Generation Techniques in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    CSFW, 2000, pp:159-167 [Conf]
  16. Catherine Meadows
    A Procedure for Verifying Security Against Type Confusion Attacks. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:62-0 [Conf]
  17. Catherine Meadows
    Representing Partial Knowledge in an Algebraic Security Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:23-31 [Conf]
  18. Catherine Meadows
    The NRL Protocol Analysis Tool: A Position Paper. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:227- [Conf]
  19. Catherine Meadows
    Panel Discussion on the Polyinstantiation Problem: An Introduction. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:234- [Conf]
  20. Catherine Meadows
    Panel: Fundamental Questions about Formal Methods. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:52- [Conf]
  21. Catherine Meadows
    A Model of Computation for the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:84-89 [Conf]
  22. Catherine Meadows
    Language generation and verification in the NRL protocol analyzer. [Citation Graph (0, 0)][DBLP]
    CSFW, 1996, pp:48-61 [Conf]
  23. Catherine Meadows
    Constructing Containers Using a Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:127-141 [Conf]
  24. Catherine Meadows
    Policies for Dynamic Upgrading. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:241-250 [Conf]
  25. Catherine Meadows
    Discussion Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:395-404 [Conf]
  26. Catherine Meadows
    Discussion Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:387-397 [Conf]
  27. Catherine Meadows
    What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    ESOP, 2003, pp:10-21 [Conf]
  28. Catherine Meadows
    Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:351-364 [Conf]
  29. Catherine Meadows, Dusko Pavlovic
    Deriving, Attacking and Defending the GDOI Protocol. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:53-72 [Conf]
  30. Dusko Pavlovic, Catherine Meadows
    Deriving Secrecy in Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:384-403 [Conf]
  31. Paul F. Syverson, Catherine Meadows
    Formal Requirements for Key Distribution Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:320-331 [Conf]
  32. Catherine Meadows, Paul F. Syverson
    A Formal Specification of Requirements for Payment Transactions in the SET Protocol. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:122-140 [Conf]
  33. Christopher Lynch, Catherine Meadows
    Sound Approximations to Diffie-Hellman Using Rewrite Rules. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:262-277 [Conf]
  34. Catherine Meadows, Ira S. Moskowitz
    Covert Channels - A Context-Based View. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:73-93 [Conf]
  35. Ran Canetti, Catherine Meadows, Paul F. Syverson
    Environmental Requirements for Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:339-355 [Conf]
  36. Catherine Meadows
    Open Issues in Formal Methods for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:21- [Conf]
  37. Catherine Meadows
    Using a Declarative Language to Build an Experimental Analysis Tool. [Citation Graph (0, 0)][DBLP]
    PADL, 2002, pp:1-2 [Conf]
  38. Catherine Meadows
    A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1986, pp:134-137 [Conf]
  39. Catherine Meadows
    The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:212-219 [Conf]
  40. Catherine Meadows
    Using Narrowing in the Analysis of Key Management Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:138-147 [Conf]
  41. Catherine Meadows
    Extending the Brewer-Nash Model to a Multilevel Context. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:95-103 [Conf]
  42. Catherine Meadows
    A System for the Specification and Verification of Key Management Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:182-197 [Conf]
  43. Catherine Meadows
    Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1999, pp:216-231 [Conf]
  44. Paul F. Syverson, Catherine Meadows
    A Formal Language for Cryptographic Protocol Requirements. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:27-59 [Journal]
  45. Christopher Lynch, Catherine Meadows
    On the Relative Soundness of the Free Algebra Model for Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:43-54 [Journal]
  46. Catherine Meadows, Dennis M. Volpano
    The MFPS XV Security Session. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal]
  47. Catherine Meadows
    A Cost-Based Framework for Analysis of Denial of Service Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:1/2, pp:143-164 [Journal]
  48. Catherine Meadows
    Applying Formal Methods to the Analysis of a Key Management Protocol. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:1, pp:5-36 [Journal]
  49. Catherine Meadows, Paul F. Syverson, Iliano Cervesato
    Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:6, pp:893-931 [Journal]
  50. Gustavus J. Simmons, Catherine Meadows
    The Role of Trust in Information Integrity Protocols. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:1, pp:71-84 [Journal]
  51. Catherine Meadows
    The NRL Protocol Analyzer: An Overview. [Citation Graph (0, 0)][DBLP]
    J. Log. Program., 1996, v:26, n:2, pp:113-131 [Journal]
  52. Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen
    Three System for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1994, v:7, n:2, pp:79-130 [Journal]
  53. Catherine Meadows
    Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2004, v:50, n:1-3, pp:3-22 [Journal]
  54. Santiago Escobar, Catherine Meadows, José Meseguer
    A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:367, n:1-2, pp:162-202 [Journal]
  55. Catherine Meadows
    Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:5, pp:281-282 [Journal]
  56. Catherine Meadows, David Mutchler
    Matching Secrets in the Absence of a Continuously Available Trusted Authority. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:2, pp:289-292 [Journal]
  57. Catherine Meadows, William H. Sanders
    Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1999, v:25, n:5, pp:601-602 [Journal]
  58. Santiago Escobar, Catherine Meadows, José Meseguer
    Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:4, pp:23-36 [Journal]
  59. Iliano Cervesato, Catherine Meadows
    One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:216-227 [Journal]

  60. State Space Reduction in the Maude-NRL Protocol Analyzer. [Citation Graph (, )][DBLP]


  61. Sequential Protocol Composition in Maude-NPA. [Citation Graph (, )][DBLP]


  62. Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.009secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002