Catherine A. Meadows

According to our database1, Catherine A. Meadows authored at least 113 papers between 1984 and 2019.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
On Asymmetric Unification for the Theory of XOR with a Homomorphism.
Proceedings of the Frontiers of Combining Systems - 12th International Symposium, 2019

2018
Model Checking Security Protocols.
Proceedings of the Handbook of Model Checking., 2018

Modular Verification of Sequential Composition for Private Channels in Maude-NPA.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA.
Proceedings of the LPAR-22. 22nd International Conference on Logic for Programming, 2018

2017
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption.
IACR Cryptology ePrint Archive, 2017

Stealthy Protocols: Metrics and Open Problems.
Proceedings of the Concurrency, Security, and Puzzles, 2017

2016
Strand spaces with choice via a process algebra semantics.
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016

2015
On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry.
Logical Methods in Computer Science, 2015

Analysis of the PKCS#11 API Using the Maude-NPA Tool.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later.
Proceedings of the Logic, Rewriting, and Concurrency, 2015

Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories.
Proceedings of the Programming Languages with Applications to Biology and Security, 2015

2014
State space reduction in the Maude-NRL Protocol Analyzer.
Inf. Comput., 2014

A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Analysis of the IBM CCA Security API Protocols in Maude-NPA.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Theories of Homomorphic Encryption, Unification, and the Finite Variant Property.
Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, 2014

A rewriting-based forwards semantics for Maude-NPA.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

On Asymmetric Unification and the Combination Problem in Disjoint Theories.
Proceedings of the Foundations of Software Science and Computation Structures, 2014

2013
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the Automated Deduction - CADE-24, 2013

2012
Special Issue on Security and Rewriting Foreword.
J. Autom. Reasoning, 2012

Dedication.
Electr. Notes Theor. Comput. Sci., 2012

Formalizing Physical Security Procedures.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Actor-Network Procedures - (Extended Abstract).
Proceedings of the Distributed Computing and Internet Technology, 2012

Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Type Checking and Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Theorem Proving and Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Program Verification and Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Formal Methods in Certification and Evaluation.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Formal Analysis of Cryptographic Protocols.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Applications of Formal Methods to Intrusion Detection.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security and Rewriting (Dagstuhl Seminar 11332).
Dagstuhl Reports, 2011

Protocol analysis in Maude-NPA using unification modulo homomorphic encryption.
Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011

2010
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol.
Electr. Notes Theor. Comput. Sci., 2010

Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

Reasoning about Probabilistic Security Using Task-PIOAs.
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010

Sequential Protocol Composition in Maude-NPA.
Proceedings of the Computer Security, 2010

2009
Introduction to ACM TISSEC special issue on CCS 2005.
ACM Trans. Inf. Syst. Secur., 2009

A Graphical User Interface for Maude-NPA.
Electr. Notes Theor. Comput. Sci., 2009

Deriving Ephemeral Authentication Using Channel Axioms.
Proceedings of the Security Protocols XVII, 2009

Deriving Ephemeral Authentication Using Channel Axioms.
Proceedings of the Security Protocols XVII, 2009

2008
State Space Reduction in the Maude-NRL Protocol Analyzer.
Proceedings of the Computer Security, 2008

2007
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements.
IEEE Trans. Dependable Sec. Comput., 2007

Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer.
Electr. Notes Theor. Comput. Sci., 2007

Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties.
Proceedings of the Foundations of Security Analysis and Design V, 2007

2006
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
Theor. Comput. Sci., 2006

Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Deriving Secrecy in Key Establishment Protocols.
Proceedings of the Computer Security, 2006

2005
On the Relative Soundness of the Free Algebra Model for Public Key Encryption.
Electr. Notes Theor. Comput. Sci., 2005

Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols.
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005

A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

2004
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols.
Sci. Comput. Program., 2004

Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer.
Journal of Computer Security, 2004

Sound Approximations to Diffie-Hellman Using Rewrite Rules.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Deriving, Attacking and Defending the GDOI Protocol.
Proceedings of the Computer Security, 2004

2003
Formal methods for cryptographic protocol analysis: emerging issues and trends.
IEEE Journal on Selected Areas in Communications, 2003

What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis.
Proceedings of the Programming Languages and Systems, 2003

A Procedure for Verifying Security Against Type Confusion Attacks.
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003

Relating cryptography and formal methods: a panel.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
Using a Declarative Language to Build an Experimental Analysis Tool.
Proceedings of the Practical Aspects of Declarative Languages, 4th International Symposium, 2002

Environmental Requirements for Authentication Protocols.
Proceedings of the Software Security -- Theories and Systems, 2002

2001
A Cost-Based Framework for Analysis of Denial of Service Networks.
Journal of Computer Security, 2001

Editorial.
Int. J. Inf. Sec., 2001

Open Issues in Formal Methods for Cryptographic Protocol Analysis.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001

Formalizing GDOI group key management requirements in NPATRL.
Proceedings of the CCS 2001, 2001

2000
Formal characterization and automated analysis of known-pair and chosen-text attacks.
IEEE Journal on Selected Areas in Communications, 2000

Invariant Generation Techniques in Cryptographic Protocol Analysis.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis.
Proceedings of the Computer Aided Verification, 12th International Conference, 2000

1999
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6).
IEEE Trans. Software Eng., 1999

The MFPS XV Security Session.
Electr. Notes Theor. Comput. Sci., 1999

Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

A Formal Framework and Evaluation Method for Network Denial of Service.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
A Formal Specification of Requirements for Payment Transactions in the SET Protocol.
Proceedings of the Financial Cryptography, 1998

Panel Introduction: Varieties of Authentication.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1997
Three paradigms in computer security.
Proceedings of the 1997 Workshop on New Security Paradigms, 1997

Languages for Formal Specification of Security Protocols.
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997

1996
Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy.
IEEE Trans. Software Eng., 1996

The NRL Protocol Analyzer: An Overview.
J. Log. Program., 1996

A Formal Language for Cryptographic Protocol Requirements.
Des. Codes Cryptogr., 1996

Covert Channels - A Context-Based View.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches.
Proceedings of the Computer Security, 1996

A representation of protocol attacks for risk assessment.
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996

Language generation and verification in the NRL protocol analyzer.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996

1995
The Role of Trust in Information Integrity Protocols.
Journal of Computer Security, 1995

Applying the dependability paradigm to computer security.
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995

1994
Three System for Cryptographic Protocol Analysis.
J. Cryptology, 1994

Formal Requirements for Key Distribution Protocols.
Proceedings of the Advances in Cryptology, 1994

A Model of Computation for the NRL Protocol Analyzer.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

Formal Verification of Cryptographic Protocols: A Survey.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
A logical language for specifying cryptographic protocol requirements.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

An outline of a taxonomy of computer security research and development.
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993

1992
Applying Formal Methods to the Analysis of a Key Management Protocol.
Journal of Computer Security, 1992

Using traces based on procedure calls to reason about composability.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Panel: Fundamental Questions about Formal Methods.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
A System for the Specification and Verification of Key Management Protocols.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

Discussion Summary.
Proceedings of the Database Security, 1991

Panel Discussion on the Polyinstantiation Problem: An Introduction.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

The NRL Protocol Analysis Tool: A Position Paper.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

1990
Extending the Brewer-Nash Model to a Multilevel Context.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

Discussion Summary.
Proceedings of the Database Security, 1990

Policies for Dynamic Upgrading.
Proceedings of the Database Security, 1990

Representing Partial Knowledge in an Algebraic Security Model.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

1989
Using Narrowing in the Analysis of Key Management Protocols.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Constructing Containers Using a Multilevel Relational Data Model.
Proceedings of the Database Security, 1989

1988
Achieving a Trusted Database Management System Using Parallelism.
Proceedings of the Database Security, 1988

1987
Matching Secrets in the Absence of a Continuously Available Trusted Authority.
IEEE Trans. Software Eng., 1987

The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Mutual Consistency in Decentralized Distributed Systems.
Proceedings of the Third International Conference on Data Engineering, 1987

Integrity Versus Security in Multi-Level Secure Databases.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1985
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

Fingerprinting Long Forgiving Messages.
Proceedings of the Advances in Cryptology, 1985

1984
Security of Ramp Schemes.
Proceedings of the Advances in Cryptology, 1984


  Loading...