Catherine Meadows
Catherine Meadows
Head, Formal Methods Section, Naval Research Laboratory
Verified email at nrl.navy.mil
Title
Cited by
Cited by
Year
The NRL protocol analyzer: An overview
C Meadows
The Journal of Logic Programming 26 (2), 113-131, 1996
7221996
Security of ramp schemes
GR Blakley, C Meadows
Advances in Cryptology, 242-268, 1985
4841985
Formal verification of cryptographic protocols: A survey
CA Meadows
International Conference on the Theory and Application of Cryptology, 133-150, 1994
3481994
Three systems for cryptographic protocol analysis
R Kemmerer, C Meadows, J Millen
Journal of CRYPTOLOGY 7 (2), 79-130, 1994
3331994
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows
IEEE journal on selected areas in communications 21 (1), 44-54, 2003
3162003
A formal framework and evaluation method for network denial of service
C Meadows
Proceedings of the 12th IEEE computer security foundations workshop, 4-13, 1999
2621999
Applying formal methods to the analysis of a key management protocol
C Meadows
Journal of Computer Security 1 (1), 5-35, 1992
2471992
Maude-NPA: Cryptographic protocol analysis modulo equational properties
S Escobar, C Meadows, J Meseguer
Foundations of Security Analysis and Design V, 1-50, 2009
2232009
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005
2142005
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
C Meadows
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
2131999
A cost-based framework for analysis of denial of service in networks
C Meadows
Journal of Computer Security 9 (1-2), 143-164, 2001
1852001
Open issues in formal methods for cryptographic protocol analysis
C Meadows
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
1752000
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
CA Meadows
European Symposium on Research in Computer Security, 351-364, 1996
1651996
Fingerprinting long forgiving messages
GR Blakley, C Meadows, GB Purdy
Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986
1411986
A system for the specification and verification of key management protocols
C Meadows
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
1161991
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
S Escobar, C Meadows, J Meseguer
Theoretical Computer Science 367 (1-2), 162-202, 2006
1152006
Distance bounding protocols: Authentication logic analysis and collusion attacks
C Meadows, R Poovendran, D Pavlovic, LW Chang, P Syverson
Secure localization and time synchronization for wireless sensor and ad hoc …, 2007
1082007
Inference problems in multilevel secure database management systems
S Jajodia, C Meadows
Information Security: An integrated collection of essays 1, 570-584, 1995
1031995
A model of computation for the NRL protocol analyzer
C Meadows
Proceedings The Computer Security Foundations Workshop VII, 84-89, 1994
1011994
A logical language for specifying cryptographic protocol requirements
P Syverson, C Meadows
Proceedings 1993 IEEE Computer Society Symposium on Research in Security and …, 1993
951993
The system can't perform the operation now. Try again later.
Articles 1–20