Search the dblp DataBase
Catherine Meadows :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Catherine Meadows , Sushil Jajodia Integrity Versus Security in Multi-Level Secure Databases. [Citation Graph (7, 0)][DBLP ] DBSec, 1987, pp:89-101 [Conf ] Sushil Jajodia , Catherine Meadows Mutual Consistency in Decentralized Distributed Systems. [Citation Graph (4, 10)][DBLP ] ICDE, 1987, pp:396-404 [Conf ] Judith N. Froscher , Catherine Meadows Achieving a Trusted Database Management System Using Parallelism. [Citation Graph (2, 0)][DBLP ] DBSec, 1988, pp:151-160 [Conf ] Catherine Meadows Formal Verification of Cryptographic Protocols: A Survey. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:135-150 [Conf ] Catherine Meadows Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CAV, 2000, pp:2- [Conf ] Michael Backes , Catherine Meadows , John C. Mitchell Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP ] FMSE, 2003, pp:61-66 [Conf ] Santiago Escobar , Catherine Meadows , José Meseguer A rewriting-based inference system for the NRL protocol analyzer: grammar generation. [Citation Graph (0, 0)][DBLP ] FMSE, 2005, pp:1-12 [Conf ] Catherine Meadows , Paul F. Syverson Formalizing GDOI group key management requirements in NPATRL. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:235-244 [Conf ] G. R. Blakley , Catherine Meadows Security of Ramp Schemes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:242-268 [Conf ] G. R. Blakley , Catherine Meadows , George B. Purdy Fingerprinting Long Forgiving Messages. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:180-189 [Conf ] Iliano Cervesato , Catherine Meadows , Dusko Pavlovic An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 2005, pp:48-61 [Conf ] Roberto Gorrieri , Paul F. Syverson , Martín Abadi , Riccardo Focardi , Dieter Gollmann , Gavin Lowe , Catherine Meadows Panel Introduction: Varieties of Authentication. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:79-82 [Conf ] Catherine Meadows Languages for Formal Specification of Security Protocols. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:96-97 [Conf ] Catherine Meadows A Formal Framework and Evaluation Method for Network Denial of Service. [Citation Graph (0, 0)][DBLP ] CSFW, 1999, pp:4-13 [Conf ] Catherine Meadows Invariant Generation Techniques in Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] CSFW, 2000, pp:159-167 [Conf ] Catherine Meadows A Procedure for Verifying Security Against Type Confusion Attacks. [Citation Graph (0, 0)][DBLP ] CSFW, 2003, pp:62-0 [Conf ] Catherine Meadows Representing Partial Knowledge in an Algebraic Security Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:23-31 [Conf ] Catherine Meadows The NRL Protocol Analysis Tool: A Position Paper. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:227- [Conf ] Catherine Meadows Panel Discussion on the Polyinstantiation Problem: An Introduction. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:234- [Conf ] Catherine Meadows Panel: Fundamental Questions about Formal Methods. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:52- [Conf ] Catherine Meadows A Model of Computation for the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:84-89 [Conf ] Catherine Meadows Language generation and verification in the NRL protocol analyzer. [Citation Graph (0, 0)][DBLP ] CSFW, 1996, pp:48-61 [Conf ] Catherine Meadows Constructing Containers Using a Multilevel Relational Data Model. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:127-141 [Conf ] Catherine Meadows Policies for Dynamic Upgrading. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:241-250 [Conf ] Catherine Meadows Discussion Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:395-404 [Conf ] Catherine Meadows Discussion Summary. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:387-397 [Conf ] Catherine Meadows What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] ESOP, 2003, pp:10-21 [Conf ] Catherine Meadows Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:351-364 [Conf ] Catherine Meadows , Dusko Pavlovic Deriving, Attacking and Defending the GDOI Protocol. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:53-72 [Conf ] Dusko Pavlovic , Catherine Meadows Deriving Secrecy in Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:384-403 [Conf ] Paul F. Syverson , Catherine Meadows Formal Requirements for Key Distribution Protocols. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:320-331 [Conf ] Catherine Meadows , Paul F. Syverson A Formal Specification of Requirements for Payment Transactions in the SET Protocol. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:122-140 [Conf ] Christopher Lynch , Catherine Meadows Sound Approximations to Diffie-Hellman Using Rewrite Rules. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:262-277 [Conf ] Catherine Meadows , Ira S. Moskowitz Covert Channels - A Context-Based View. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:73-93 [Conf ] Ran Canetti , Catherine Meadows , Paul F. Syverson Environmental Requirements for Authentication Protocols. [Citation Graph (0, 0)][DBLP ] ISSS, 2002, pp:339-355 [Conf ] Catherine Meadows Open Issues in Formal Methods for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:21- [Conf ] Catherine Meadows Using a Declarative Language to Build an Experimental Analysis Tool. [Citation Graph (0, 0)][DBLP ] PADL, 2002, pp:1-2 [Conf ] Catherine Meadows A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1986, pp:134-137 [Conf ] Catherine Meadows The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:212-219 [Conf ] Catherine Meadows Using Narrowing in the Analysis of Key Management Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:138-147 [Conf ] Catherine Meadows Extending the Brewer-Nash Model to a Multilevel Context. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:95-103 [Conf ] Catherine Meadows A System for the Specification and Verification of Key Management Protocols. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:182-197 [Conf ] Catherine Meadows Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1999, pp:216-231 [Conf ] Paul F. Syverson , Catherine Meadows A Formal Language for Cryptographic Protocol Requirements. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:27-59 [Journal ] Christopher Lynch , Catherine Meadows On the Relative Soundness of the Free Algebra Model for Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:43-54 [Journal ] Catherine Meadows , Dennis M. Volpano The MFPS XV Security Session. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 1999, v:20, n:, pp:- [Journal ] Catherine Meadows A Cost-Based Framework for Analysis of Denial of Service Networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:1/2, pp:143-164 [Journal ] Catherine Meadows Applying Formal Methods to the Analysis of a Key Management Protocol. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1992, v:1, n:1, pp:5-36 [Journal ] Catherine Meadows , Paul F. Syverson , Iliano Cervesato Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:6, pp:893-931 [Journal ] Gustavus J. Simmons , Catherine Meadows The Role of Trust in Information Integrity Protocols. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:1, pp:71-84 [Journal ] Catherine Meadows The NRL Protocol Analyzer: An Overview. [Citation Graph (0, 0)][DBLP ] J. Log. Program., 1996, v:26, n:2, pp:113-131 [Journal ] Richard A. Kemmerer , Catherine Meadows , Jonathan K. Millen Three System for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1994, v:7, n:2, pp:79-130 [Journal ] Catherine Meadows Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. [Citation Graph (0, 0)][DBLP ] Sci. Comput. Program., 2004, v:50, n:1-3, pp:3-22 [Journal ] Santiago Escobar , Catherine Meadows , José Meseguer A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2006, v:367, n:1-2, pp:162-202 [Journal ] Catherine Meadows Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:281-282 [Journal ] Catherine Meadows , David Mutchler Matching Secrets in the Absence of a Continuously Available Trusted Authority. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:2, pp:289-292 [Journal ] Catherine Meadows , William H. Sanders Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1999, v:25, n:5, pp:601-602 [Journal ] Santiago Escobar , Catherine Meadows , José Meseguer Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:4, pp:23-36 [Journal ] Iliano Cervesato , Catherine Meadows One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:3, pp:216-227 [Journal ] State Space Reduction in the Maude-NRL Protocol Analyzer. [Citation Graph (, )][DBLP ] Sequential Protocol Composition in Maude-NPA. [Citation Graph (, )][DBLP ] Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. [Citation Graph (, )][DBLP ] Search in 0.068secs, Finished in 0.070secs