Catherine Meadows

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

64EESantiago Escobar, Catherine Meadows, José Meseguer: State Space Reduction in the Maude-NRL Protocol Analyzer. ESORICS 2008: 548-562
63 Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings Springer 2007
62EESantiago Escobar, Catherine Meadows, José Meseguer: Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. Electr. Notes Theor. Comput. Sci. 171(4): 23-36 (2007)
61EEIliano Cervesato, Catherine Meadows: One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. IEEE Trans. Dependable Sec. Comput. 4(3): 216-227 (2007)
60EEDusko Pavlovic, Catherine Meadows: Deriving Secrecy in Key Establishment Protocols. ESORICS 2006: 384-403
59EESantiago Escobar, Catherine Meadows, José Meseguer: A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1-2): 162-202 (2006)
58 Vijay Atluri, Catherine Meadows, Ari Juels: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 ACM 2005
57 Catherine Meadows: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005 ACM 2005
56EEIliano Cervesato, Catherine Meadows, Dusko Pavlovic: An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. CSFW 2005: 48-61
55EESantiago Escobar, Catherine Meadows, José Meseguer: A rewriting-based inference system for the NRL protocol analyzer: grammar generation. FMSE 2005: 1-12
54EEChristopher Lynch, Catherine Meadows: On the Relative Soundness of the Free Algebra Model for Public Key Encryption. Electr. Notes Theor. Comput. Sci. 125(1): 43-54 (2005)
53EECatherine Meadows, Dusko Pavlovic: Deriving, Attacking and Defending the GDOI Protocol. ESORICS 2004: 53-72
52EEChristopher Lynch, Catherine Meadows: Sound Approximations to Diffie-Hellman Using Rewrite Rules. ICICS 2004: 262-277
51 Catherine Meadows, Paul F. Syverson, Iliano Cervesato: Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12(6): 893-931 (2004)
50EECatherine Meadows: Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. Sci. Comput. Program. 50(1-3): 3-22 (2004)
49EECatherine Meadows: A Procedure for Verifying Security Against Type Confusion Attacks. CSFW 2003: 62-
48EECatherine Meadows: What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. ESOP 2003: 10-21
47EEMichael Backes, Catherine Meadows, John C. Mitchell: Relating cryptography and formal methods: a panel. FMSE 2003: 61-66
46EERan Canetti, Catherine Meadows, Paul F. Syverson: Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355
45EECatherine Meadows: Using a Declarative Language to Build an Experimental Analysis Tool. PADL 2002: 1-2
44EECatherine Meadows, Paul F. Syverson: Formalizing GDOI group key management requirements in NPATRL. ACM Conference on Computer and Communications Security 2001: 235-244
43EECatherine Meadows: Open Issues in Formal Methods for Cryptographic Protocol Analysis. MMM-ACNS 2001: 21
42 Catherine Meadows: A Cost-Based Framework for Analysis of Denial of Service Networks. Journal of Computer Security 9(1/2): 143-164 (2001)
41 Catherine Meadows: Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. CAV 2000: 2
40EECatherine Meadows: Invariant Generation Techniques in Cryptographic Protocol Analysis. CSFW 2000: 159-167
39EECatherine Meadows: A Formal Framework and Evaluation Method for Network Denial of Service. CSFW 1999: 4-13
38EECatherine Meadows: Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. IEEE Symposium on Security and Privacy 1999: 216-231
37EECatherine Meadows, Dennis M. Volpano: The MFPS XV Security Session. Electr. Notes Theor. Comput. Sci. 20: (1999)
36EECatherine Meadows, William H. Sanders: Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). IEEE Trans. Software Eng. 25(5): 601-602 (1999)
35 Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998
34EERoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
33EECatherine Meadows, Paul F. Syverson: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140
32EECatherine Meadows: Languages for Formal Specification of Security Protocols. CSFW 1997: 96-97
31EECatherine Meadows: Language generation and verification in the NRL protocol analyzer. CSFW 1996: 48-61
30EECatherine Meadows: Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. ESORICS 1996: 351-364
29 Catherine Meadows, Ira S. Moskowitz: Covert Channels - A Context-Based View. Information Hiding 1996: 73-93
28 Paul F. Syverson, Catherine Meadows: A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptography 7(1-2): 27-59 (1996)
27EECatherine Meadows: Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. IEEE Trans. Software Eng. 22(5): 281-282 (1996)
26 Catherine Meadows: The NRL Protocol Analyzer: An Overview. J. Log. Program. 26(2): 113-131 (1996)
25 Gustavus J. Simmons, Catherine Meadows: The Role of Trust in Information Integrity Protocols. Journal of Computer Security 3(1): 71-84 (1995)
24 Catherine Meadows: Formal Verification of Cryptographic Protocols: A Survey. ASIACRYPT 1994: 135-150
23 Catherine Meadows: A Model of Computation for the NRL Protocol Analyzer. CSFW 1994: 84-89
22EEPaul F. Syverson, Catherine Meadows: Formal Requirements for Key Distribution Protocols. EUROCRYPT 1994: 320-331
21 Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen: Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994)
20 Catherine Meadows: Panel: Fundamental Questions about Formal Methods. CSFW 1992: 52
19 Catherine Meadows: Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security 1(1): 5-36 (1992)
18 Catherine Meadows: The NRL Protocol Analysis Tool: A Position Paper. CSFW 1991: 227
17 Catherine Meadows: Panel Discussion on the Polyinstantiation Problem: An Introduction. CSFW 1991: 234
16 Catherine Meadows: Discussion Summary. DBSec 1991: 387-397
15 Catherine Meadows: A System for the Specification and Verification of Key Management Protocols. IEEE Symposium on Security and Privacy 1991: 182-197
14 Catherine Meadows: Representing Partial Knowledge in an Algebraic Security Model. CSFW 1990: 23-31
13 Catherine Meadows: Policies for Dynamic Upgrading. DBSec 1990: 241-250
12 Catherine Meadows: Discussion Summary. DBSec 1990: 395-404
11 Catherine Meadows: Extending the Brewer-Nash Model to a Multilevel Context. IEEE Symposium on Security and Privacy 1990: 95-103
10 Catherine Meadows: Constructing Containers Using a Multilevel Relational Data Model. DBSec 1989: 127-141
9 Catherine Meadows: Using Narrowing in the Analysis of Key Management Protocols. IEEE Symposium on Security and Privacy 1989: 138-147
8 Judith N. Froscher, Catherine Meadows: Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160
7 Catherine Meadows, Sushil Jajodia: Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101
6EESushil Jajodia, Catherine Meadows: Mutual Consistency in Decentralized Distributed Systems. ICDE 1987: 396-404
5 Catherine Meadows: The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. IEEE Symposium on Security and Privacy 1987: 212-219
4 Catherine Meadows, David Mutchler: Matching Secrets in the Absence of a Continuously Available Trusted Authority. IEEE Trans. Software Eng. 13(2): 289-292 (1987)
3 Catherine Meadows: A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. IEEE Symposium on Security and Privacy 1986: 134-137
2EEG. R. Blakley, Catherine Meadows, George B. Purdy: Fingerprinting Long Forgiving Messages. CRYPTO 1985: 180-189
1EEG. R. Blakley, Catherine Meadows: Security of Ramp Schemes. CRYPTO 1984: 242-268

Coauthor Index

1Martín Abadi [34]
2Vijayalakshmi Atluri (Vijay Atluri) [58]
3Michael Backes [47]
4G. R. Blakley [1] [2]
5Ran Canetti [46]
6Srdjan Capkun [63]
7Iliano Cervesato [51] [56] [61]
8Yves Deswarte [35]
9Santiago Escobar [55] [59] [62] [64]
10Riccardo Focardi [34]
11Judith N. Froscher [8]
12Dieter Gollmann [34] [35]
13Roberto Gorrieri [34]
14Sushil Jajodia [6] [7]
15Ari Juels [58]
16Richard A. Kemmerer [21]
17Gavin Lowe [34]
18Christopher Lynch [52] [54]
19José Meseguer [55] [59] [62] [64]
20Jonathan K. Millen [21]
21John C. Mitchell [47]
22Tyler Moore [63]
23Ira S. Moskowitz [29]
24David Mutchler [4]
25Dusko Pavlovic [53] [56] [60]
26George B. Purdy [2]
27Jean-Jacques Quisquater [35]
28William H. Sanders [36]
29Gustavus J. Simmons [25]
30Frank Stajano [63]
31Paul F. Syverson [22] [28] [33] [34] [44] [46] [51]
32Dennis M. Volpano [37]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)