Catherine Meadows
Catherine Meadows
Head, Formal Methods Section, Naval Research Laboratory
Bestätigte E-Mail-Adresse bei nrl.navy.mil
Titel
Zitiert von
Zitiert von
Jahr
The NRL protocol analyzer: An overview
C Meadows
The Journal of Logic Programming 26 (2), 113-131, 1996
7061996
Security of ramp schemes
GR Blakley, C Meadows
Advances in Cryptology, 242-268, 1985
4721985
Formal verification of cryptographic protocols: A survey
CA Meadows
International Conference on the Theory and Application of Cryptology, 133-150, 1994
3451994
Three systems for cryptographic protocol analysis
R Kemmerer, C Meadows, J Millen
Journal of CRYPTOLOGY 7 (2), 79-130, 1994
3221994
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows
Selected Areas in Communications, IEEE Journal on 21 (1), 44-54, 2003
3122003
A formal framework and evaluation method for network denial of service
C Meadows
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE, 4-13, 1999
2571999
Applying formal methods to the analysis of a key management protocol
C Meadows
Journal of Computer Security 1 (1), 5-35, 1992
2441992
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
Wireless Communications and Networking Conference, 2005 IEEE 2, 1193-1199, 2005
2122005
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
C Meadows
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on, 216-231, 1999
2091999
Maude-NPA: Cryptographic protocol analysis modulo equational properties
S Escobar, C Meadows, J Meseguer
Foundations of Security Analysis and Design V, 1-50, 2009
2062009
A cost-based framework for analysis of denial of service in networks
C Meadows
Journal of Computer Security 9 (1), 143-164, 2001
1822001
Open issues in formal methods for cryptographic protocol analysis
C Meadows
DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00 …, 2000
1692000
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
CA Meadows
Computer Security—ESORICS 96, 351-364, 1996
1621996
Fingerprinting long forgiving messages
GR Blakley, C Meadows, GB Purdy
Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986
1431986
A system for the specification and analysis of key management protocols
C Meadows
Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer …, 1991
113*1991
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
S Escobar, C Meadows, J Meseguer
Theoretical Computer Science 367 (1), 162-202, 2006
1072006
Distance bounding protocols: Authentication logic analysis and collusion attacks
C Meadows, R Poovendran, D Pavlovic, LW Chang, P Syverson
Secure localization and time synchronization for wireless sensor and ad hoc …, 2007
992007
A model of computation for the NRL protocol analyzer
C Meadows
Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings, 84-89, 1994
981994
Inference problems in multilevel secure database management systems
S Jajodia, C Meadows
Information Security: An integrated collection of essays 1, 570-584, 1995
971995
A logical language for specifying cryptographic protocol requirements
P Syverson, C Meadows
Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer …, 1993
941993
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20