| 2009 |
66 | | S. Santiago,
Carolyn L. Talcott,
Santiago Escobar,
Catherine Meadows,
José Meseguer:
A Graphical User Interface for Maude-NPA.
Electr. Notes Theor. Comput. Sci. 258(1): 3-20 (2009) |
| 2008 |
65 | | Santiago Escobar,
Catherine Meadows,
José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer.
ESORICS 2008: 548-562 |
| 2007 |
64 | | Frank Stajano,
Catherine Meadows,
Srdjan Capkun,
Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings
Springer 2007 |
63 | | Santiago Escobar,
Catherine Meadows,
José Meseguer:
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties.
FOSAD 2007: 1-50 |
62 | | Santiago Escobar,
Catherine Meadows,
José Meseguer:
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer.
Electr. Notes Theor. Comput. Sci. 171(4): 23-36 (2007) |
61 | | Iliano Cervesato,
Catherine Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements.
IEEE Trans. Dependable Sec. Comput. 4(3): 216-227 (2007) |
| 2006 |
60 | | Dusko Pavlovic,
Catherine Meadows:
Deriving Secrecy in Key Establishment Protocols.
ESORICS 2006: 384-403 |
59 | | Santiago Escobar,
Catherine Meadows,
José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
Theor. Comput. Sci. 367(1-2): 162-202 (2006) |
| 2005 |
58 | | Vijay Atluri,
Catherine Meadows,
Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005
ACM 2005 |
57 | | Catherine Meadows:
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005
ACM 2005 |
56 | | Iliano Cervesato,
Catherine Meadows,
Dusko Pavlovic:
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
CSFW 2005: 48-61 |
55 | | Santiago Escobar,
Catherine Meadows,
José Meseguer:
A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
FMSE 2005: 1-12 |
54 | | Christopher Lynch,
Catherine Meadows:
On the Relative Soundness of the Free Algebra Model for Public Key Encryption.
Electr. Notes Theor. Comput. Sci. 125(1): 43-54 (2005) |
| 2004 |
53 | | Catherine Meadows,
Dusko Pavlovic:
Deriving, Attacking and Defending the GDOI Protocol.
ESORICS 2004: 53-72 |
52 | | Christopher Lynch,
Catherine Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules.
ICICS 2004: 262-277 |
51 | | Catherine Meadows,
Paul F. Syverson,
Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer.
Journal of Computer Security 12(6): 893-931 (2004) |
50 | | Catherine Meadows:
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols.
Sci. Comput. Program. 50(1-3): 3-22 (2004) |
| 2003 |
49 | | Catherine Meadows:
A Procedure for Verifying Security Against Type Confusion Attacks.
CSFW 2003: 62- |
48 | | Catherine Meadows:
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis.
ESOP 2003: 10-21 |
47 | | Michael Backes,
Catherine Meadows,
John C. Mitchell:
Relating cryptography and formal methods: a panel.
FMSE 2003: 61-66 |
| 2002 |
46 | | Ran Canetti,
Catherine Meadows,
Paul F. Syverson:
Environmental Requirements for Authentication Protocols.
ISSS 2002: 339-355 |
45 | | Catherine Meadows:
Using a Declarative Language to Build an Experimental Analysis Tool.
PADL 2002: 1-2 |
| 2001 |
44 | | Catherine Meadows,
Paul F. Syverson:
Formalizing GDOI group key management requirements in NPATRL.
ACM Conference on Computer and Communications Security 2001: 235-244 |
43 | | Catherine Meadows:
Open Issues in Formal Methods for Cryptographic Protocol Analysis.
MMM-ACNS 2001: 21 |
42 | | Catherine Meadows:
A Cost-Based Framework for Analysis of Denial of Service Networks.
Journal of Computer Security 9(1/2): 143-164 (2001) |
| 2000 |
41 | | Catherine Meadows:
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis.
CAV 2000: 2 |
40 | | Catherine Meadows:
Invariant Generation Techniques in Cryptographic Protocol Analysis.
CSFW 2000: 159-167 |
| 1999 |
39 | | Catherine Meadows:
A Formal Framework and Evaluation Method for Network Denial of Service.
CSFW 1999: 4-13 |
38 | | Catherine Meadows:
Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer.
IEEE Symposium on Security and Privacy 1999: 216-231 |
37 | | Catherine Meadows,
Dennis M. Volpano:
The MFPS XV Security Session.
Electr. Notes Theor. Comput. Sci. 20: (1999) |
36 | | Catherine Meadows,
William H. Sanders:
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6).
IEEE Trans. Software Eng. 25(5): 601-602 (1999) |
| 1998 |
35 | | Jean-Jacques Quisquater,
Yves Deswarte,
Catherine Meadows,
Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings
Springer 1998 |
34 | | Roberto Gorrieri,
Paul F. Syverson,
Martín Abadi,
Riccardo Focardi,
Dieter Gollmann,
Gavin Lowe,
Catherine Meadows:
Panel Introduction: Varieties of Authentication.
CSFW 1998: 79-82 |
33 | | Catherine Meadows,
Paul F. Syverson:
A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
Financial Cryptography 1998: 122-140 |
| 1997 |
32 | | Catherine Meadows:
Languages for Formal Specification of Security Protocols.
CSFW 1997: 96-97 |
| 1996 |
31 | | Catherine Meadows:
Language generation and verification in the NRL protocol analyzer.
CSFW 1996: 48-61 |
30 | | Catherine Meadows:
Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches.
ESORICS 1996: 351-364 |
29 | | Catherine Meadows,
Ira S. Moskowitz:
Covert Channels - A Context-Based View.
Information Hiding 1996: 73-93 |
28 | | Paul F. Syverson,
Catherine Meadows:
A Formal Language for Cryptographic Protocol Requirements.
Des. Codes Cryptography 7(1-2): 27-59 (1996) |
27 | | Catherine Meadows:
Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy.
IEEE Trans. Software Eng. 22(5): 281-282 (1996) |
26 | | Catherine Meadows:
The NRL Protocol Analyzer: An Overview.
J. Log. Program. 26(2): 113-131 (1996) |
| 1995 |
25 | | Gustavus J. Simmons,
Catherine Meadows:
The Role of Trust in Information Integrity Protocols.
Journal of Computer Security 3(1): 71-84 (1995) |
| 1994 |
24 | | Catherine Meadows:
Formal Verification of Cryptographic Protocols: A Survey.
ASIACRYPT 1994: 135-150 |
23 | | Catherine Meadows:
A Model of Computation for the NRL Protocol Analyzer.
CSFW 1994: 84-89 |
22 | | Paul F. Syverson,
Catherine Meadows:
Formal Requirements for Key Distribution Protocols.
EUROCRYPT 1994: 320-331 |
21 | | Richard A. Kemmerer,
Catherine Meadows,
Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis.
J. Cryptology 7(2): 79-130 (1994) |
| 1992 |
20 | | Catherine Meadows:
Panel: Fundamental Questions about Formal Methods.
CSFW 1992: 52 |
19 | | Catherine Meadows:
Applying Formal Methods to the Analysis of a Key Management Protocol.
Journal of Computer Security 1(1): 5-36 (1992) |
| 1991 |
18 | | Catherine Meadows:
The NRL Protocol Analysis Tool: A Position Paper.
CSFW 1991: 227 |
17 | | Catherine Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction.
CSFW 1991: 234 |
16 | | Catherine Meadows:
Discussion Summary.
DBSec 1991: 387-397 |
15 | | Catherine Meadows:
A System for the Specification and Verification of Key Management Protocols.
IEEE Symposium on Security and Privacy 1991: 182-197 |
| 1990 |
14 | | Catherine Meadows:
Representing Partial Knowledge in an Algebraic Security Model.
CSFW 1990: 23-31 |
13 | | Catherine Meadows:
Policies for Dynamic Upgrading.
DBSec 1990: 241-250 |
12 | | Catherine Meadows:
Discussion Summary.
DBSec 1990: 395-404 |
11 | | Catherine Meadows:
Extending the Brewer-Nash Model to a Multilevel Context.
IEEE Symposium on Security and Privacy 1990: 95-103 |
| 1989 |
10 | | Catherine Meadows:
Constructing Containers Using a Multilevel Relational Data Model.
DBSec 1989: 127-141 |
9 | | Catherine Meadows:
Using Narrowing in the Analysis of Key Management Protocols.
IEEE Symposium on Security and Privacy 1989: 138-147 |
| 1988 |
8 | | Judith N. Froscher,
Catherine Meadows:
Achieving a Trusted Database Management System Using Parallelism.
DBSec 1988: 151-160 |
| 1987 |
7 | | Catherine Meadows,
Sushil Jajodia:
Integrity Versus Security in Multi-Level Secure Databases.
DBSec 1987: 89-101 |
6 | | Sushil Jajodia,
Catherine Meadows:
Mutual Consistency in Decentralized Distributed Systems.
ICDE 1987: 396-404 |
5 | | Catherine Meadows:
The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels.
IEEE Symposium on Security and Privacy 1987: 212-219 |
4 | | Catherine Meadows,
David Mutchler:
Matching Secrets in the Absence of a Continuously Available Trusted Authority.
IEEE Trans. Software Eng. 13(2): 289-292 (1987) |
| 1986 |
3 | | Catherine Meadows:
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
IEEE Symposium on Security and Privacy 1986: 134-137 |
| 1985 |
2 | | G. R. Blakley,
Catherine Meadows,
George B. Purdy:
Fingerprinting Long Forgiving Messages.
CRYPTO 1985: 180-189 |
| 1984 |
1 | | G. R. Blakley,
Catherine Meadows:
Security of Ramp Schemes.
CRYPTO 1984: 242-268 |