Catherine Meadows
Catherine Meadows
Head, Formal Methods Section, Naval Research Laboratory
Email verificata su nrl.navy.mil
Titolo
Citata da
Citata da
Anno
The NRL protocol analyzer: An overview
C Meadows
The Journal of Logic Programming 26 (2), 113-131, 1996
7071996
Security of ramp schemes
GR Blakley, C Meadows
Advances in Cryptology, 242-268, 1985
4561985
Formal verification of cryptographic protocols: A survey
CA Meadows
International Conference on the Theory and Application of Cryptology, 133-150, 1994
3401994
Three systems for cryptographic protocol analysis
R Kemmerer, C Meadows, J Millen
Journal of CRYPTOLOGY 7 (2), 79-130, 1994
3221994
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows
Selected Areas in Communications, IEEE Journal on 21 (1), 44-54, 2003
3092003
A formal framework and evaluation method for network denial of service
C Meadows
Computer Security Foundations Workshop, 1999. Proceedings of the 12th IEEE, 4-13, 1999
2541999
Applying formal methods to the analysis of a key management protocol
C Meadows
Journal of Computer Security 1 (1), 5-35, 1992
2421992
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
Wireless Communications and Networking Conference, 2005 IEEE 2, 1193-1199, 2005
2102005
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
C Meadows
Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on, 216-231, 1999
2091999
Maude-NPA: Cryptographic protocol analysis modulo equational properties
S Escobar, C Meadows, J Meseguer
Foundations of Security Analysis and Design V, 1-50, 2009
2022009
A cost-based framework for analysis of denial of service in networks
C Meadows
Journal of Computer Security 9 (1), 143-164, 2001
1772001
Open issues in formal methods for cryptographic protocol analysis
C Meadows
DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00 …, 2000
1662000
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
CA Meadows
Computer Security—ESORICS 96, 351-364, 1996
1611996
Fingerprinting long forgiving messages
GR Blakley, C Meadows, GB Purdy
Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986
1411986
A system for the specification and analysis of key management protocols
C Meadows
Research in Security and Privacy, 1991. Proceedings., 1991 IEEE Computer …, 1991
1111991
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties
S Escobar, C Meadows, J Meseguer
Theoretical Computer Science 367 (1), 162-202, 2006
1082006
Inference problems in multilevel secure database management systems
S Jajodia, C Meadows
Information Security: An integrated collection of essays 1, 570-584, 1995
971995
A model of computation for the NRL protocol analyzer
C Meadows
Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings, 84-89, 1994
951994
Distance bounding protocols: Authentication logic analysis and collusion attacks
C Meadows, R Poovendran, D Pavlovic, LW Chang, P Syverson
Secure localization and time synchronization for wireless sensor and ad hoc …, 2007
932007
A logical language for specifying cryptographic protocol requirements
P Syverson, C Meadows
Research in Security and Privacy, 1993. Proceedings., 1993 IEEE Computer …, 1993
921993
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20