Seguir
Catherine Meadows
Catherine Meadows
Head, Formal Methods Section, Naval Research Laboratory
Dirección de correo verificada de nrl.navy.mil
Título
Citado por
Citado por
Año
The NRL protocol analyzer: An overview
C Meadows
The Journal of Logic Programming 26 (2), 113-131, 1996
7561996
Security of ramp schemes
GR Blakley, C Meadows
Advances in Cryptology, 242-268, 1985
5691985
Formal verification of cryptographic protocols: A survey
CA Meadows
International Conference on the Theory and Application of Cryptology, 133-150, 1994
3791994
Three systems for cryptographic protocol analysis
R Kemmerer, C Meadows, J Millen
Journal of CRYPTOLOGY 7 (2), 79-130, 1994
3541994
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows
IEEE journal on selected areas in communications 21 (1), 44-54, 2003
3262003
Maude-NPA: Cryptographic protocol analysis modulo equational properties
S Escobar, C Meadows, J Meseguer
Foundations of Security Analysis and Design V, 1-50, 2009
2932009
A formal framework and evaluation method for network denial of service
C Meadows
Proceedings of the 12th IEEE computer security foundations workshop, 4-13, 1999
2701999
Applying formal methods to the analysis of a key management protocol
CA Meadows
NAVAL RESEARCH LAB WASHINGTON DC, 1990
2691990
Applying formal methods to the analysis of a key management protocol
C Meadows
Journal of Computer Security 1 (1), 5-35, 1992
2621992
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
C Meadows
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
2281999
A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party
C Meadows
IEEE Symposium on Security and Privacy, 134-137, 1986
2281986
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005
2222005
A cost-based framework for analysis of denial of service in networks
C Meadows
Journal of Computer Security 9 (1-2), 143-164, 2001
1922001
Open issues in formal methods for cryptographic protocol analysis
C Meadows
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
1782000
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
CA Meadows
European Symposium on Research in Computer Security, 351-364, 1996
1761996
Fingerprinting long forgiving messages
GR Blakley, C Meadows, GB Purdy
Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986
1581986
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
S Escobar, C Meadows, J Meseguer
Theoretical Computer Science 367 (1-2), 162-202, 2006
1472006
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1322018
Model Checking Security Protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1322018
A system for the specification and verification of key management protocols
C Meadows
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
1181991
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20