Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Catherine Meadows 0001
@inproceedings{DBLP:conf/birthday/Yang0MMS23, author = {Fan Yang and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, editor = {Pedro L{\'{o}}pez{-}Garc{\'{\i}}a and John P. Gallagher and Roberto Giacobazzi}, title = {Strand Spaces with Choice via a Process Algebra Semantics}, booktitle = {Analysis, Verification and Transformation for Declarative Programming and Intelligent Systems - Essays Dedicated to Manuel Hermenegildo on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13160}, pages = {307--350}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31476-6\_17}, doi = {10.1007/978-3-031-31476-6\_17}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Yang0MMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/GalanGEMM23, author = {D. Gal{\'{a}}n and V{\'{\i}}ctor Garc{\'{\i}}a and Santiago Escobar and Catherine A. Meadows and Jos{\'{e}} Meseguer}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Protocol Dialects as Formal Patterns}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {42--61}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_3}, doi = {10.1007/978-3-031-51476-0\_3}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/GalanGEMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Meadows22, author = {Catherine Meadows}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {2--3}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3516669}, doi = {10.1145/3508398.3516669}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/Meadows22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-2209-10321, author = {Dalton Chichester and Wei Du and Raymond Kauffman and Hai Lin and Christopher Lynch and Andrew M. Marshall and Catherine A. Meadows and Paliath Narendran and Veena Ravishankar and Luis Rovira and Brandon Rozek}, editor = {Pierre Ganty and Dario Della Monica}, title = {CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms}, booktitle = {Proceedings of the 13th International Symposium on Games, Automata, Logics and Formal Verification, GandALF 2022, Madrid, Spain, September 21-23, 2022}, series = {{EPTCS}}, volume = {370}, pages = {147--161}, year = {2022}, url = {https://doi.org/10.4204/EPTCS.370.10}, doi = {10.4204/EPTCS.370.10}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-10321.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Aparicio-Sanchez21, author = {Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Julia Sapi{\~{n}}a}, editor = {Daniel Dougherty and Jos{\'{e}} Meseguer and Sebastian Alexander M{\"{o}}dersheim and Paul D. Rowe}, title = {Protocol Analysis with Time and Space}, booktitle = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday}, series = {Lecture Notes in Computer Science}, volume = {13066}, pages = {22--49}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-91631-2\_2}, doi = {10.1007/978-3-030-91631-2\_2}, timestamp = {Thu, 21 Sep 2023 09:08:34 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Aparicio-Sanchez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Meadows21, author = {Catherine Meadows}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Moving the Bar on Computationally Sound Exclusive-Or}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12973}, pages = {275--295}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88428-4\_14}, doi = {10.1007/978-3-030-88428-4\_14}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Meadows21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/LinLMMNRR21, author = {Hai Lin and Christopher Lynch and Andrew M. Marshall and Catherine A. Meadows and Paliath Narendran and Veena Ravishankar and Brandon Rozek}, editor = {Boris Konev and Giles Reger}, title = {Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems}, booktitle = {Frontiers of Combining Systems - 13th International Symposium, FroCoS 2021, Birmingham, UK, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12941}, pages = {253--270}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-86205-3\_14}, doi = {10.1007/978-3-030-86205-3\_14}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/frocos/LinLMMNRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ChenJMS20, author = {Olga Chen and Aaron D. Jaggard and Catherine Meadows and Michael C. Shlanta}, title = {NExtSteP: An Extensible Testbed for Network Covert Channels}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162247}, doi = {10.1109/CNS48642.2020.9162247}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/ChenJMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Aparicio-Sanchez20, author = {Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Julia Sapi{\~{n}}a}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Protocol Analysis with Time}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {128--150}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_7}, doi = {10.1007/978-3-030-65277-7\_7}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Aparicio-Sanchez20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/unif/MarshallMNRR20, author = {Andrew M. Marshall and Catherine Meadows and Paliath Narendran and Veena Ravishankar and Brandon Rozek}, editor = {Temur Kutsia and Andrew M. Marshall}, title = {Algorithmic Problems in Synthesized Cryptosystems (Extended Abstract)}, booktitle = {Proceedings of the 34th International Workshop on Unification, {UNIF} 2020, Linz, Austria, June 29, 2020}, pages = {10:1--10:6}, year = {2020}, url = {http://www3.risc.jku.at/publications/download/risc\_6129/proceedings-UNIF2020.pdf\#page=58}, timestamp = {Wed, 20 Sep 2023 10:23:47 +0200}, biburl = {https://dblp.org/rec/conf/unif/MarshallMNRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-13707, author = {Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Julia Sapi{\~{n}}a}, title = {Protocol Analysis with Time}, journal = {CoRR}, volume = {abs/2010.13707}, year = {2020}, url = {https://arxiv.org/abs/2010.13707}, eprinttype = {arXiv}, eprint = {2010.13707}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-13707.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Meadows20, author = {Catherine Meadows}, title = {Symbolic and Computational Reasoning About Cryptographic Modes of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2020}, url = {https://eprint.iacr.org/2020/794}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Meadows20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/frocos/LynchMMNR19, author = {Christopher Lynch and Andrew M. Marshall and Catherine Meadows and Paliath Narendran and Veena Ravishankar}, editor = {Andreas Herzig and Andrei Popescu}, title = {On Asymmetric Unification for the Theory of {XOR} with a Homomorphism}, booktitle = {Frontiers of Combining Systems - 12th International Symposium, FroCoS 2019, London, UK, September 4-6, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11715}, pages = {297--312}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29007-8\_17}, doi = {10.1007/978-3-030-29007-8\_17}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/frocos/LynchMMNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-09946, author = {Fan Yang and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, title = {Strand Spaces with Choice via a Process Algebra Semantics}, journal = {CoRR}, volume = {abs/1904.09946}, year = {2019}, url = {http://arxiv.org/abs/1904.09946}, eprinttype = {arXiv}, eprint = {1904.09946}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-09946.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-00227, author = {Christopher Lynch and Andrew M. Marshall and Catherine Meadows and Paliath Narendran and Veena Ravishankar}, title = {On Asymmetric Unification for the Theory of {XOR} with a Homomorphism}, journal = {CoRR}, volume = {abs/1907.00227}, year = {2019}, url = {http://arxiv.org/abs/1907.00227}, eprinttype = {arXiv}, eprint = {1907.00227}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-00227.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/Gonzalez-Burgueno18, author = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Gilles Barthe and Geoff Sutcliffe and Margus Veanes}, title = {Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA}, booktitle = {{LPAR-22.} 22nd International Conference on Logic for Programming, Artificial Intelligence and Reasoning, Awassa, Ethiopia, 16-21 November 2018}, series = {EPiC Series in Computing}, volume = {57}, pages = {400--417}, publisher = {EasyChair}, year = {2018}, url = {https://doi.org/10.29007/c4xk}, doi = {10.29007/C4XK}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lpar/Gonzalez-Burgueno18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/YangEMM18, author = {Fan Yang and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Sokratis K. Katsikas and Cristina Alcaraz}, title = {Modular Verification of Sequential Composition for Private Channels in Maude-NPA}, booktitle = {Security and Trust Management - 14th International Workshop, {STM} 2018, Barcelona, Spain, September 6-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11091}, pages = {20--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01141-3\_2}, doi = {10.1007/978-3-030-01141-3\_2}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/YangEMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/mc/BasinCM18, author = {David A. Basin and Cas Cremers and Catherine Meadows}, editor = {Edmund M. Clarke and Thomas A. Henzinger and Helmut Veith and Roderick Bloem}, title = {Model Checking Security Protocols}, booktitle = {Handbook of Model Checking}, pages = {727--762}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-10575-8\_22}, doi = {10.1007/978-3-319-10575-8\_22}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/mc/BasinCM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-07209, author = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and Dami{\'{a}}n Aparicio and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, title = {Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA}, journal = {CoRR}, volume = {abs/1806.07209}, year = {2018}, url = {http://arxiv.org/abs/1806.07209}, eprinttype = {arXiv}, eprint = {1806.07209}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-07209.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/ChenMT17, author = {Olga Chen and Catherine Meadows and Gautam Trivedi}, editor = {Thomas Gibson{-}Robinson and Philippa J. Hopcroft and Ranko Lazic}, title = {Stealthy Protocols: Metrics and Open Problems}, booktitle = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William Roscoe on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {10160}, pages = {1--17}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-51046-0\_1}, doi = {10.1007/978-3-319-51046-0\_1}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/ChenMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Meadows17, author = {Catherine Meadows}, title = {Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1152}, year = {2017}, url = {http://eprint.iacr.org/2017/1152}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Meadows17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/YangEMMS16, author = {Fan Yang and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, editor = {James Cheney and Germ{\'{a}}n Vidal}, title = {Strand spaces with choice via a process algebra semantics}, booktitle = {Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, Edinburgh, United Kingdom, September 5-7, 2016}, pages = {76--89}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2967973.2968609}, doi = {10.1145/2967973.2968609}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppdp/YangEMMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016-1, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9878}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45744-4}, doi = {10.1007/978-3-319-45744-4}, isbn = {978-3-319-45743-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2016-2, editor = {Ioannis G. Askoxylakis and Sotiris Ioannidis and Sokratis K. Katsikas and Catherine Meadows}, title = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9879}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45741-3}, doi = {10.1007/978-3-319-45741-3}, isbn = {978-3-319-45740-6}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SantiagoEMM16, author = {Sonia Santiago and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, title = {Effective Sequential Protocol Composition in Maude-NPA}, journal = {CoRR}, volume = {abs/1603.00087}, year = {2016}, url = {http://arxiv.org/abs/1603.00087}, eprinttype = {arXiv}, eprint = {1603.00087}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SantiagoEMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MarshallMN15, author = {Andrew M. Marshall and Catherine Meadows and Paliath Narendran}, title = {On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry}, journal = {Log. Methods Comput. Sci.}, volume = {11}, number = {2}, year = {2015}, url = {https://doi.org/10.2168/LMCS-11(2:11)2015}, doi = {10.2168/LMCS-11(2:11)2015}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MarshallMN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/EscobarMMS15, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, editor = {Chiara Bodei and Gian{-}Luigi Ferrari and Corrado Priami}, title = {Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories}, booktitle = {Programming Languages with Applications to Biology and Security - Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9465}, pages = {238--261}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25527-9\_16}, doi = {10.1007/978-3-319-25527-9\_16}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/EscobarMMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Meadows15, author = {Catherine Meadows}, editor = {Narciso Mart{\'{\i}}{-}Oliet and Peter Csaba {\"{O}}lveczky and Carolyn L. Talcott}, title = {Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later}, booktitle = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}} Meseguer on the Occasion of His 65th Birthday}, series = {Lecture Notes in Computer Science}, volume = {9200}, pages = {475--492}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-23165-5\_22}, doi = {10.1007/978-3-319-23165-5\_22}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Meadows15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/Gonzalez-Burgueno15, author = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and Sonia Santiago and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Liqun Chen and Shin'ichiro Matsuo}, title = {Analysis of the PKCS{\#}11 {API} Using the Maude-NPA Tool}, booktitle = {Security Standardisation Research - Second International Conference, {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9497}, pages = {86--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27152-1\_5}, doi = {10.1007/978-3-319-27152-1\_5}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/Gonzalez-Burgueno15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/EscobarMMS14, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, title = {State space reduction in the Maude-NRL Protocol Analyzer}, journal = {Inf. Comput.}, volume = {238}, pages = {157--186}, year = {2014}, url = {https://doi.org/10.1016/j.ic.2014.07.007}, doi = {10.1016/J.IC.2014.07.007}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/EscobarMMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fossacs/ErbaturKMMNR14, author = {Serdar Erbatur and Deepak Kapur and Andrew M. Marshall and Catherine Meadows and Paliath Narendran and Christophe Ringeissen}, editor = {Anca Muscholl}, title = {On Asymmetric Unification and the Combination Problem in Disjoint Theories}, booktitle = {Foundations of Software Science and Computation Structures - 17th International Conference, {FOSSACS} 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2014, Grenoble, France, April 5-13, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8412}, pages = {274--288}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54830-7\_18}, doi = {10.1007/978-3-642-54830-7\_18}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fossacs/ErbaturKMMNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/EscobarMMS14, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {A rewriting-based forwards semantics for Maude-NPA}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {3}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600186}, doi = {10.1145/2600176.2600186}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/EscobarMMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/YangEMMN14, author = {Fan Yang and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Paliath Narendran}, editor = {Olaf Chitil and Andy King and Olivier Danvy}, title = {Theories of Homomorphic Encryption, Unification, and the Finite Variant Property}, booktitle = {Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, Kent, Canterbury, United Kingdom, September 8-10, 2014}, pages = {123--133}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2643135.2643154}, doi = {10.1145/2643135.2643154}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppdp/YangEMMN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/Gonzalez-Burgueno14, author = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and Sonia Santiago and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Liqun Chen and Chris J. Mitchell}, title = {Analysis of the {IBM} {CCA} Security {API} Protocols in Maude-NPA}, booktitle = {Security Standardisation Research - First International Conference, {SSR} 2014, London, UK, December 16-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8893}, pages = {111--130}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-14054-4\_8}, doi = {10.1007/978-3-319-14054-4\_8}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secsr/Gonzalez-Burgueno14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SantiagoEMM14, author = {Sonia Santiago and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Sjouke Mauw and Christian Damsgaard Jensen}, title = {A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA}, booktitle = {Security and Trust Management - 10th International Workshop, {STM} 2014, Wroclaw, Poland, September 10-11, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8743}, pages = {162--177}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11851-2\_11}, doi = {10.1007/978-3-319-11851-2\_11}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SantiagoEMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/unif/ErbaturKMMNR14, author = {Serdar Erbatur and Deepak Kapur and Andrew M. Marshall and Catherine Meadows and Paliath Narendran and Christophe Ringeissen}, editor = {Temur Kutsia and Christophe Ringeissen}, title = {On Asymmetric Unification and the Combination Problem in Disjoint Theories (Extended Abstract)}, booktitle = {Proceedings of the 28th International Workshop on Unification, {UNIF} 2014, Vienna, Austria, July 13, 2014}, pages = {33--35}, year = {2014}, url = {https://www3.risc.jku.at/publications/download/risc\_5001/proceedings-UNIF2014.pdf\#page=38}, timestamp = {Tue, 19 Sep 2023 15:35:06 +0200}, biburl = {https://dblp.org/rec/conf/unif/ErbaturKMMNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cade/ErbaturEKLLMMNSS13, author = {Serdar Erbatur and Santiago Escobar and Deepak Kapur and Zhiqiang Liu and Christopher Lynch and Catherine Meadows and Jos{\'{e}} Meseguer and Paliath Narendran and Sonia Santiago and Ralf Sasse}, editor = {Maria Paola Bonacina}, title = {Asymmetric Unification: {A} New Unification Paradigm for Cryptographic Protocol Analysis}, booktitle = {Automated Deduction - {CADE-24} - 24th International Conference on Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7898}, pages = {231--248}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38574-2\_16}, doi = {10.1007/978-3-642-38574-2\_16}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cade/ErbaturEKLLMMNSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/Comon-LundhM12, author = {Hubert Comon{-}Lundh and Catherine Meadows}, title = {Special Issue on Security and Rewriting Foreword}, journal = {J. Autom. Reason.}, volume = {48}, number = {2}, pages = {133--134}, year = {2012}, url = {https://doi.org/10.1007/s10817-011-9242-1}, doi = {10.1007/S10817-011-9242-1}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/Comon-LundhM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ErbaturEKLLMMNSS12, author = {Serdar Erbatur and Santiago Escobar and Deepak Kapur and Zhiqiang Liu and Christopher Lynch and Catherine Meadows and Jos{\'{e}} Meseguer and Paliath Narendran and Sonia Santiago and Ralf Sasse}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {73--90}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_5}, doi = {10.1007/978-3-642-33167-1\_5}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/ErbaturEKLLMMNSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/PavlovicM12, author = {Dusko Pavlovic and Catherine Meadows}, editor = {Ramaswamy Ramanujam and Srini Ramaswamy}, title = {Actor-Network Procedures - (Extended Abstract)}, booktitle = {Distributed Computing and Internet Technology - 8th International Conference, {ICDCIT} 2012, Bhubaneswar, India, February 2-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7154}, pages = {7--26}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-28073-3\_2}, doi = {10.1007/978-3-642-28073-3\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/PavlovicM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/MeadowsP12, author = {Catherine Meadows and Dusko Pavlovic}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Formalizing Physical Security Procedures}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {193--208}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_13}, doi = {10.1007/978-3-642-38004-4\_13}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/MeadowsP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BrookesJMMP12, author = {Stephen D. Brookes and Achim Jung and Catherine Meadows and Michael W. Mislove and Prakash Panangaden}, editor = {Ulrich Berger and Michael W. Mislove}, title = {Dedication}, booktitle = {Proceedings of the 28th Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2012, Bath, UK, June 6-9, 2012}, series = {Electronic Notes in Theoretical Computer Science}, volume = {286}, pages = {3}, publisher = {Elsevier}, year = {2012}, url = {https://doi.org/10.1016/j.entcs.2012.08.022}, doi = {10.1016/J.ENTCS.2012.08.022}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/BrookesJMMP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/stm/2011, editor = {Catherine Meadows and M. Carmen Fern{\'{a}}ndez Gago}, title = {Security and Trust Management - 7th International Workshop, {STM} 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7170}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29963-6}, doi = {10.1007/978-3-642-29963-6}, isbn = {978-3-642-29962-9}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ppdp/EscobarKLMMNS11, author = {Santiago Escobar and Deepak Kapur and Christopher Lynch and Catherine Meadows and Jos{\'{e}} Meseguer and Paliath Narendran and Ralf Sasse}, editor = {Peter Schneider{-}Kamp and Michael Hanus}, title = {Protocol analysis in Maude-NPA using unification modulo homomorphic encryption}, booktitle = {Proceedings of the 13th International {ACM} {SIGPLAN} Conference on Principles and Practice of Declarative Programming, July 20-22, 2011, Odense, Denmark}, pages = {65--76}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2003476.2003488}, doi = {10.1145/2003476.2003488}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ppdp/EscobarKLMMNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/unif/ErbaturEKLLMMNS11, author = {Serdar Erbatur and Santiago Escobar and Deepak Kapur and Zhiqiang Liu and Christopher Lynch and Catherine Meadows and Jos{\'{e}} Meseguer and Paliath Narendran and Ralf Sasse}, editor = {Franz Baader and Barbara Morawska and Jan Otop}, title = {Asymmetric Unification: {A} New Unification Paradigm for Cryptographic Protocol Analysis}, booktitle = {Proceedings of the 25th International Workshop on Unification, {UNIF} 2011, Wroclaw, Poland, July 31, 2011}, pages = {59--64}, year = {2011}, url = {https://www.irif.fr/\%7Etreinen/unif/past/unif11/unif11-proceedings.pdf\#page=65}, timestamp = {Mon, 23 Oct 2023 15:28:12 +0200}, biburl = {https://dblp.org/rec/conf/unif/ErbaturEKLLMMNS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Meadows11, author = {Catherine Meadows}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Applications of Formal Methods to Intrusion Detection}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {44--45}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_855}, doi = {10.1007/978-1-4419-5906-5\_855}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Meadows11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Meadows11a, author = {Catherine Meadows}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Formal Analysis of Cryptographic Protocols}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {490--492}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_876}, doi = {10.1007/978-1-4419-5906-5\_876}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Meadows11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Meadows11b, author = {Catherine Meadows}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Formal Methods in Certification and Evaluation}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {498--499}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_858}, doi = {10.1007/978-1-4419-5906-5\_858}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Meadows11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Meadows11c, author = {Catherine Meadows}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Program Verification and Security}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {981--983}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_863}, doi = {10.1007/978-1-4419-5906-5\_863}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Meadows11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Meadows11d, author = {Catherine Meadows}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Theorem Proving and Security}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1285--1287}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_869}, doi = {10.1007/978-1-4419-5906-5\_869}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Meadows11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Meadows11e, author = {Catherine Meadows}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Type Checking and Security}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1342--1343}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_867}, doi = {10.1007/978-1-4419-5906-5\_867}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Meadows11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1105-5282, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, title = {State Space Reduction in the Maude-NRL Protocol Analyzer}, journal = {CoRR}, volume = {abs/1105.5282}, year = {2011}, url = {http://arxiv.org/abs/1105.5282}, eprinttype = {arXiv}, eprint = {1105.5282}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1105-5282.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-0706, author = {Dusko Pavlovic and Catherine Meadows}, title = {Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions}, journal = {CoRR}, volume = {abs/1106.0706}, year = {2011}, url = {http://arxiv.org/abs/1106.0706}, eprinttype = {arXiv}, eprint = {1106.0706}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-0706.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/Comon-LundhKM11, author = {Hubert Comon{-}Lundh and Ralf K{\"{u}}sters and Catherine Meadows}, title = {Security and Rewriting (Dagstuhl Seminar 11332)}, journal = {Dagstuhl Reports}, volume = {1}, number = {8}, pages = {53--66}, year = {2011}, url = {https://doi.org/10.4230/DagRep.1.8.53}, doi = {10.4230/DAGREP.1.8.53}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/Comon-LundhKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EscobarMMS10, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Sequential Protocol Composition in Maude-NPA}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {303--318}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_19}, doi = {10.1007/978-3-642-15497-3\_19}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EscobarMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10, author = {Aaron D. Jaggard and Catherine Meadows and Michael W. Mislove and Roberto Segala}, editor = {Alessandro Armando and Gavin Lowe}, title = {Reasoning about Probabilistic Security Using Task-PIOAs}, booktitle = {Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus, March 27-28, 2010. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6186}, pages = {2--22}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16074-5\_2}, doi = {10.1007/978-3-642-16074-5\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/SasseEMM10, author = {Ralf Sasse and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Jorge Cu{\'{e}}llar and Gilles Barthe and Alexander Pretschner}, title = {Protocol Analysis Modulo Combination of Theories: {A} Case Study in Maude-NPA}, booktitle = {Security and Trust Management - 6th International Workshop, {STM} 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6710}, pages = {163--178}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-22444-7\_11}, doi = {10.1007/978-3-642-22444-7\_11}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SasseEMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/PavlovicM10, author = {Dusko Pavlovic and Catherine Meadows}, editor = {Michael W. Mislove and Peter Selinger}, title = {Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol}, booktitle = {Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, {MFPS} 2010, Ottawa, Ontario, Canada, May 6-10, 2010}, series = {Electronic Notes in Theoretical Computer Science}, volume = {265}, pages = {97--122}, publisher = {Elsevier}, year = {2010}, url = {https://doi.org/10.1016/j.entcs.2010.08.007}, doi = {10.1016/J.ENTCS.2010.08.007}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/PavlovicM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Meadows09, author = {Catherine Meadows}, title = {Introduction to {ACM} {TISSEC} special issue on {CCS} 2005}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {1:1--1:2}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609957}, doi = {10.1145/1609956.1609957}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Meadows09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/PavlovicM09, author = {Dusko Pavlovic and Catherine Meadows}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Deriving Ephemeral Authentication Using Channel Axioms}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {240--261}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_27}, doi = {10.1007/978-3-642-36213-2\_27}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/PavlovicM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Meadows09, author = {Catherine Meadows}, editor = {Bruce Christianson and James A. Malcolm and Vashek Matyas and Michael Roe}, title = {Deriving Ephemeral Authentication Using Channel Axioms}, booktitle = {Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7028}, pages = {262--268}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-36213-2\_28}, doi = {10.1007/978-3-642-36213-2\_28}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spw/Meadows09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/SantiagoTEMM09, author = {Sonia Santiago and Carolyn L. Talcott and Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Paqui Lucio and Gin{\'{e}}s Moreno and Ricardo Pe{\~{n}}a}, title = {A Graphical User Interface for Maude-NPA}, booktitle = {Proceedings of the Ninth Spanish Conference on Programming and Languages, {PROLE} 2009, San Sebasti{\'{a}}n, Spain, September 9-11, 2009}, series = {Electronic Notes in Theoretical Computer Science}, volume = {258}, number = {1}, pages = {3--20}, publisher = {Elsevier}, year = {2009}, url = {https://doi.org/10.1016/j.entcs.2009.12.002}, doi = {10.1016/J.ENTCS.2009.12.002}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/SantiagoTEMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/PavlovicM09, author = {Dusko Pavlovic and Catherine Meadows}, title = {Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol}, journal = {CoRR}, volume = {abs/0910.5745}, year = {2009}, url = {http://arxiv.org/abs/0910.5745}, eprinttype = {arXiv}, eprint = {0910.5745}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/PavlovicM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/EscobarMM08, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {State Space Reduction in the Maude-NRL Protocol Analyzer}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {548--562}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_35}, doi = {10.1007/978-3-540-88313-5\_35}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/EscobarMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CervesatoM07, author = {Iliano Cervesato and Catherine Meadows}, title = {One Picture Is Worth a Dozen Connectives: {A} Fault-Tree Representation of {NPATRL} Security Requirements}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {4}, number = {3}, pages = {216--227}, year = {2007}, url = {https://doi.org/10.1109/TDSC.2007.70206}, doi = {10.1109/TDSC.2007.70206}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CervesatoM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/EscobarMM07, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Alessandro Aldini and Gilles Barthe and Roberto Gorrieri}, title = {Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties}, booktitle = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {5705}, pages = {1--50}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-03829-7\_1}, doi = {10.1007/978-3-642-03829-7\_1}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fosad/EscobarMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MeadowsPPCS07, author = {Catherine Meadows and Radha Poovendran and Dusko Pavlovic and LiWu Chang and Paul F. Syverson}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {279--298}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_12}, doi = {10.1007/978-0-387-46276-9\_12}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MeadowsPPCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esas/2007, editor = {Frank Stajano and Catherine Meadows and Srdjan Capkun and Tyler Moore}, title = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4572}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73275-4}, doi = {10.1007/978-3-540-73275-4}, isbn = {978-3-540-73274-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esas/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/EscobarMM06, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, title = {A rewriting-based inference system for the {NRL} Protocol Analyzer and its meta-logical properties}, journal = {Theor. Comput. Sci.}, volume = {367}, number = {1-2}, pages = {162--202}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.035}, doi = {10.1016/J.TCS.2006.08.035}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/EscobarMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PavlovicM06, author = {Dusko Pavlovic and Catherine Meadows}, editor = {Dieter Gollmann and Jan Meier and Andrei Sabelfeld}, title = {Deriving Secrecy in Key Establishment Protocols}, booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4189}, pages = {384--403}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11863908\_24}, doi = {10.1007/11863908\_24}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PavlovicM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/MeadowsSC06, author = {Catherine Meadows and Paul F. Syverson and LiWu Chang}, title = {Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--5}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359532}, doi = {10.1109/SECCOMW.2006.359532}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/MeadowsSC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/EscobarMM07, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Maribel Fern{\'{a}}ndez and Claude Kirchner}, title = {Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer}, booktitle = {Proceedings of the First International Workshop on Security and Rewriting Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {23--36}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2007.02.053}, doi = {10.1016/J.ENTCS.2007.02.053}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/EscobarMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EscobarMM05, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer}, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {A rewriting-based inference system for the {NRL} protocol analyzer: grammar generation}, booktitle = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, pages = {1--12}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103576.1103578}, doi = {10.1145/1103576.1103578}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EscobarMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/CervesatoMP05, author = {Iliano Cervesato and Catherine Meadows and Dusko Pavlovic}, title = {An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols}, booktitle = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005), 20-22 June 2005, Aix-en-Provence, France}, pages = {48--61}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSFW.2005.7}, doi = {10.1109/CSFW.2005.7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/CervesatoMP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LazosPMSC05, author = {Loukas Lazos and Radha Poovendran and Catherine Meadows and Paul F. Syverson and LiWu Chang}, title = {Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach}, booktitle = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005, March 13-17, 2005, New Orleans, Louisiana, {USA}}, pages = {1193--1199}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/WCNC.2005.1424678}, doi = {10.1109/WCNC.2005.1424678}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/LazosPMSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-226-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/popl/2005wits, editor = {Catherine Meadows}, title = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of Security, {WITS} 2005, Long Beach, California, USA, January 10-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-58113-980-2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/popl/2005wits.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MeadowsSC04, author = {Catherine Meadows and Paul F. Syverson and Iliano Cervesato}, title = {Formal specification and analysis of the Group Domain Of Interpretation Protocol using {NPATRL} and the {NRL} Protocol Analyzer}, journal = {J. Comput. Secur.}, volume = {12}, number = {6}, pages = {893--931}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12604}, doi = {10.3233/JCS-2004-12604}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MeadowsSC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/Meadows04, author = {Catherine Meadows}, title = {Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols}, journal = {Sci. Comput. Program.}, volume = {50}, number = {1-3}, pages = {3--22}, year = {2004}, url = {https://doi.org/10.1016/j.scico.2003.12.001}, doi = {10.1016/J.SCICO.2003.12.001}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scp/Meadows04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MeadowsP04, author = {Catherine Meadows and Dusko Pavlovic}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {Deriving, Attacking and Defending the {GDOI} Protocol}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {53--72}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_4}, doi = {10.1007/978-3-540-30108-0\_4}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MeadowsP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LynchM04, author = {Christopher Lynch and Catherine Meadows}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Sound Approximations to Diffie-Hellman Using Rewrite Rules}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {262--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_21}, doi = {10.1007/978-3-540-30191-2\_21}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LynchM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/LynchM05, author = {Christopher Lynch and Catherine Meadows}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {On the Relative Soundness of the Free Algebra Model for Public Key Encryption}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {43--54}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.018}, doi = {10.1016/J.ENTCS.2004.05.018}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/LynchM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Meadows03, author = {Catherine Meadows}, title = {Formal methods for cryptographic protocol analysis: emerging issues and trends}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {21}, number = {1}, pages = {44--54}, year = {2003}, url = {https://doi.org/10.1109/JSAC.2002.806125}, doi = {10.1109/JSAC.2002.806125}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/Meadows03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BackesMM03, author = {Michael Backes and Catherine Meadows and John C. Mitchell}, editor = {Michael Backes and David A. Basin}, title = {Relating cryptography and formal methods: a panel}, booktitle = {Proceedings of the 2003 {ACM} workshop on Formal methods in security engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003}, pages = {61--66}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/1035429.1035436}, doi = {10.1145/1035429.1035436}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BackesMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows03, author = {Catherine Meadows}, title = {A Procedure for Verifying Security Against Type Confusion Attacks}, booktitle = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003), 30 June - 2 July 2003, Pacific Grove, CA, {USA}}, pages = {62}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSFW.2003.1212705}, doi = {10.1109/CSFW.2003.1212705}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esop/Meadows03, author = {Catherine Meadows}, editor = {Pierpaolo Degano}, title = {What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis}, booktitle = {Programming Languages and Systems, 12th European Symposium on Programming, {ESOP} 2003, Held as Part of the Joint European Conferences on Theory and Practice of Software, {ETAPS} 2003, Warsaw, Poland, April 7-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2618}, pages = {10--21}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36575-3\_2}, doi = {10.1007/3-540-36575-3\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esop/Meadows03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isss2/CanettiMS02, author = {Ran Canetti and Catherine Meadows and Paul F. Syverson}, editor = {Mitsuhiro Okada and Benjamin C. Pierce and Andre Scedrov and Hideyuki Tokuda and Akinori Yonezawa}, title = {Environmental Requirements for Authentication Protocols}, booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2609}, pages = {339--355}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36532-X\_21}, doi = {10.1007/3-540-36532-X\_21}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isss2/CanettiMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/padl/Meadows02, author = {Catherine Meadows}, editor = {Shriram Krishnamurthi and C. R. Ramakrishnan}, title = {Using a Declarative Language to Build an Experimental Analysis Tool}, booktitle = {Practical Aspects of Declarative Languages, 4th International Symposium, {PADL} 2002, Portland, OR, USA, January 19-20, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2257}, pages = {1--2}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45587-6\_1}, doi = {10.1007/3-540-45587-6\_1}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/padl/Meadows02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/X01, author = {Dieter Gollmann and Catherine A. Meadows and Eiji Okamoto}, title = {Editorial}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {1}, pages = {1--2}, year = {2001}, url = {https://doi.org/10.1007/s102070100004}, doi = {10.1007/S102070100004}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/X01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Meadows01, author = {Catherine Meadows}, title = {A Cost-Based Framework for Analysis of Denial of Service Networks}, journal = {J. Comput. Secur.}, volume = {9}, number = {1/2}, pages = {143--164}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-91-206}, doi = {10.3233/JCS-2001-91-206}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Meadows01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MeadowsS01, author = {Catherine Meadows and Paul F. Syverson}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Formalizing {GDOI} group key management requirements in {NPATRL}}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {235--244}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502016}, doi = {10.1145/501983.502016}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MeadowsS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Meadows01, author = {Catherine Meadows}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {Open Issues in Formal Methods for Cryptographic Protocol Analysis}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {21}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_3}, doi = {10.1007/3-540-45116-1\_3}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Meadows01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vis/Meadows01, author = {Catherine Meadows}, editor = {Dirk Fox and Marit K{\"{o}}hntopp and Andreas Pfitzmann}, title = {Experiences in the Formal Analysis of the Group Domain of Interpretation Protocol {(GDOI)}}, booktitle = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel}, pages = {147--150}, publisher = {Vieweg+Teubner Verlag}, year = {2001}, url = {https://doi.org/10.1007/978-3-663-05918-9\_10}, doi = {10.1007/978-3-663-05918-9\_10}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vis/Meadows01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/StubblebineM00, author = {Stuart G. Stubblebine and Catherine A. Meadows}, title = {Formal characterization and automated analysis of known-pair and chosen-text attacks}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {18}, number = {4}, pages = {571--581}, year = {2000}, url = {https://doi.org/10.1109/49.839933}, doi = {10.1109/49.839933}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/StubblebineM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/Meadows00, author = {Catherine Meadows}, editor = {E. Allen Emerson and A. Prasad Sistla}, title = {Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis}, booktitle = {Computer Aided Verification, 12th International Conference, {CAV} 2000, Chicago, IL, USA, July 15-19, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1855}, pages = {2}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10722167\_2}, doi = {10.1007/10722167\_2}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/Meadows00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows00, author = {Catherine Meadows}, title = {Invariant Generation Techniques in Cryptographic Protocol Analysis}, booktitle = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop, {CSFW} '00, Cambridge, England, UK, July 3-5, 2000}, pages = {159--167}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/CSFW.2000.856934}, doi = {10.1109/CSFW.2000.856934}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/MeadowsS99, author = {Catherine Meadows and William H. Sanders}, title = {Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications {(DCCA-6)}}, journal = {{IEEE} Trans. Software Eng.}, volume = {25}, number = {5}, pages = {601--602}, year = {1999}, url = {http://doi.ieeecomputersociety.org/10.1109/TSE.1999.10006}, doi = {10.1109/TSE.1999.10006}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/MeadowsS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows99, author = {Catherine Meadows}, title = {A Formal Framework and Evaluation Method for Network Denial of Service}, booktitle = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop, {CSFW} 1999, Mordano, Italy, June 28-30, 1999}, pages = {4--13}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSFW.1999.779758}, doi = {10.1109/CSFW.1999.779758}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows99, author = {Catherine Meadows}, title = {Analysis of the Internet Key Exchange Protocol using the {NRL} Protocol Analyzer}, booktitle = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 9-12, 1999}, pages = {216--231}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/SECPRI.1999.766916}, doi = {10.1109/SECPRI.1999.766916}, timestamp = {Thu, 21 Sep 2023 15:57:37 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MeadowsV99, author = {Catherine Meadows and Dennis M. Volpano}, editor = {Stephen D. Brookes and Achim Jung and Michael W. Mislove and Andre Scedrov}, title = {The {MFPS} {XV} Security Session}, booktitle = {Fifteenth Conference on Mathematical Foundations of Progamming Semantics, {MFPS} 1999, Tulane University, New Orleans, LA, USA, April 28 - May 1, 1999}, series = {Electronic Notes in Theoretical Computer Science}, volume = {20}, pages = {76--79}, publisher = {Elsevier}, year = {1999}, url = {https://doi.org/10.1016/S1571-0661(04)80067-7}, doi = {10.1016/S1571-0661(04)80067-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/MeadowsV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/GorrieriSAFGLM98, author = {Roberto Gorrieri and Paul F. Syverson and Mart{\'{\i}}n Abadi and Riccardo Focardi and Dieter Gollmann and Gavin Lowe and Catherine Meadows}, title = {Panel Introduction: Varieties of Authentication}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {79--82}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.1998.10000}, doi = {10.1109/CSFW.1998.10000}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/GorrieriSAFGLM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/MeadowsS98, author = {Catherine Meadows and Paul F. Syverson}, editor = {Rafael Hirschfeld}, title = {A Formal Specification of Requirements for Payment Transactions in the {SET} Protocol}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {122--140}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055477}, doi = {10.1007/BFB0055477}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/MeadowsS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/1998, editor = {Jean{-}Jacques Quisquater and Yves Deswarte and Catherine Meadows and Dieter Gollmann}, title = {Computer Security - {ESORICS} 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1485}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055851}, doi = {10.1007/BFB0055851}, isbn = {3-540-65004-0}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows97, author = {Catherine Meadows}, title = {Languages for Formal Specification of Security Protocols}, booktitle = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12, 1997, Rockport, Massachusetts, {USA}}, pages = {96--97}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/CSFW.1997.596792}, doi = {10.1109/CSFW.1997.596792}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Meadows97, author = {Catherine Meadows}, editor = {Tom Haigh and Bob Blakley and Mary Ellen Zurko and Catherine Meodaws}, title = {Three paradigms in computer security}, booktitle = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997}, pages = {34--37}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/283699.283737}, doi = {10.1145/283699.283737}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Meadows97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SyversonM96, author = {Paul F. Syverson and Catherine Meadows}, title = {A Formal Language for Cryptographic Protocol Requirements}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {27--59}, year = {1996}, url = {https://doi.org/10.1023/A:1018069220646}, doi = {10.1023/A:1018069220646}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SyversonM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jlp/Meadows96, author = {Catherine Meadows}, title = {The {NRL} Protocol Analyzer: An Overview}, journal = {J. Log. Program.}, volume = {26}, number = {2}, pages = {113--131}, year = {1996}, url = {https://doi.org/10.1016/0743-1066(95)00095-X}, doi = {10.1016/0743-1066(95)00095-X}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jlp/Meadows96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/Meadows96, author = {Catherine Meadows}, title = {Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 {IEEE} Symposium on Security and Privacy}, journal = {{IEEE} Trans. Software Eng.}, volume = {22}, number = {5}, pages = {281--282}, year = {1996}, url = {http://doi.ieeecomputersociety.org/10.1109/TSE.1996.10003}, doi = {10.1109/TSE.1996.10003}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/Meadows96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows96, author = {Catherine Meadows}, title = {Language generation and verification in the {NRL} protocol analyzer}, booktitle = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12, 1996, Dromquinna Manor, Kenmare, County Kerry, Ireland}, pages = {48--61}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/CSFW.1996.503690}, doi = {10.1109/CSFW.1996.503690}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimacs/Meadows96, author = {Catherine Meadows}, editor = {Rebecca N. Wright and Peter G. Neumann}, title = {A representation of protocol attacks for risk assessment}, booktitle = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4, 1996}, series = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science}, volume = {38}, pages = {1--10}, publisher = {{DIMACS/AMS}}, year = {1996}, url = {https://doi.org/10.1090/dimacs/038/01}, doi = {10.1090/DIMACS/038/01}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dimacs/Meadows96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Meadows96, author = {Catherine A. Meadows}, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, title = {Analyzing the Needham-Schroeder Public-Key Protocol: {A} Comparison of Two Approaches}, booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1146}, pages = {351--364}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61770-1\_46}, doi = {10.1007/3-540-61770-1\_46}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Meadows96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/MeadowsM96, author = {Catherine Meadows and Ira S. Moskowitz}, editor = {Ross J. Anderson}, title = {Covert Channels - {A} Context-Based View}, booktitle = {Information Hiding, First International Workshop, Cambridge, UK, May 30 - June 1, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1174}, pages = {73--93}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61996-8\_33}, doi = {10.1007/3-540-61996-8\_33}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ih/MeadowsM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SimmonsM95, author = {Gustavus J. Simmons and Catherine Meadows}, title = {The Role of Trust in Information Integrity Protocols}, journal = {J. Comput. Secur.}, volume = {3}, number = {1}, pages = {71--84}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3106}, doi = {10.3233/JCS-1994/1995-3106}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SimmonsM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Meadows95, author = {Catherine Meadows}, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Applying the dependability paradigm to computer security}, booktitle = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, pages = {75--79}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/NSPW.1995.492346}, doi = {10.1109/NSPW.1995.492346}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Meadows95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1995, editor = {Hilary H. Hosmer and John E. Dobson and Catherine Meadows}, title = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://ieeexplore.ieee.org/xpl/conhome/3552/proceeding}, isbn = {0-8186-7318-4}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1995.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KemmererMM94, author = {Richard A. Kemmerer and Catherine Meadows and Jonathan K. Millen}, title = {Three System for Cryptographic Protocol Analysis}, journal = {J. Cryptol.}, volume = {7}, number = {2}, pages = {79--130}, year = {1994}, url = {https://doi.org/10.1007/BF00197942}, doi = {10.1007/BF00197942}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KemmererMM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Meadows94, author = {Catherine A. Meadows}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Formal Verification of Cryptographic Protocols: {A} Survey}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {135--150}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000430}, doi = {10.1007/BFB0000430}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Meadows94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows94, author = {Catherine Meadows}, title = {A Model of Computation for the {NRL} Protocol Analyzer}, booktitle = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings}, pages = {84--89}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/CSFW.1994.315945}, doi = {10.1109/CSFW.1994.315945}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SyversonM94, author = {Paul F. Syverson and Catherine Meadows}, editor = {Alfredo De Santis}, title = {Formal Requirements for Key Distribution Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, pages = {320--331}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0053447}, doi = {10.1007/BFB0053447}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SyversonM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/Meadows93, author = {Catherine Meadows}, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {An outline of a taxonomy of computer security research and development}, booktitle = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, pages = {33--35}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751.283770}, doi = {10.1145/283751.283770}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/nspw/Meadows93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SyversonM93, author = {Paul Syverson and Catherine Meadows}, title = {A logical language for specifying cryptographic protocol requirements}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {165--177}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287634}, doi = {10.1109/RISP.1993.287634}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/SyversonM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nspw/1993, editor = {James Bret Michael and Victoria Ashby and Catherine Meadows}, title = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/283751}, doi = {10.1145/283751}, isbn = {0-8186-5430-9}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/1993.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Meadows92, author = {Catherine Meadows}, title = {Applying Formal Methods to the Analysis of a Key Management Protocol}, journal = {J. Comput. Secur.}, volume = {1}, number = {1}, pages = {5--36}, year = {1992}, url = {https://doi.org/10.3233/JCS-1992-1102}, doi = {10.3233/JCS-1992-1102}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Meadows92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows92, author = {Catherine Meadows}, title = {Panel: Fundamental Questions about Formal Methods}, booktitle = {5th {IEEE} Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings}, pages = {52}, publisher = {{IEEE} Computer Society}, year = {1992}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows92, author = {Catherine Meadows}, title = {Using traces based on procedure calls to reason about composability}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {177--188}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213262}, doi = {10.1109/RISP.1992.213262}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows91, author = {Catherine Meadows}, title = {The {NRL} Protocol Analysis Tool: {A} Position Paper}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {227}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/CSFW.1991.151592}, doi = {10.1109/CSFW.1991.151592}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows91a, author = {Catherine Meadows}, title = {Panel Discussion on the Polyinstantiation Problem: An Introduction}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {234}, publisher = {{IEEE} Computer Society}, year = {1991}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Meadows91, author = {Catherine Meadows}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {Discussion Summary}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {387--397}, publisher = {North-Holland}, year = {1991}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Meadows91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows91, author = {Catherine Meadows}, title = {A System for the Specification and Verification of Key Management Protocols}, booktitle = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 20-22, 1991}, pages = {182--197}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/RISP.1991.130786}, doi = {10.1109/RISP.1991.130786}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Meadows90, author = {Catherine Meadows}, title = {Representing Partial Knowledge in an Algebraic Security Model}, booktitle = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings}, pages = {23--31}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/CSFW.1990.128182}, doi = {10.1109/CSFW.1990.128182}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Meadows90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Meadows90, author = {Catherine Meadows}, editor = {Sushil Jajodia and Carl E. Landwehr}, title = {Policies for Dynamic Upgrading}, booktitle = {Database Security, {IV:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990}, pages = {241--250}, publisher = {North-Holland}, year = {1990}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Meadows90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Meadows90a, author = {Catherine Meadows}, editor = {Sushil Jajodia and Carl E. Landwehr}, title = {Discussion Summary}, booktitle = {Database Security, {IV:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990}, pages = {395--404}, publisher = {North-Holland}, year = {1990}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Meadows90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows90, author = {Catherine Meadows}, title = {Extending the Brewer-Nash Model to a Multilevel Context}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {95--103}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63842}, doi = {10.1109/RISP.1990.63842}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Meadows89, author = {Catherine Meadows}, editor = {David L. Spooner and Carl E. Landwehr}, title = {Constructing Containers Using a Multilevel Relational Data Model}, booktitle = {Database Security, {III:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989}, pages = {127--141}, publisher = {North-Holland}, year = {1989}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Meadows89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows89, author = {Catherine Meadows}, title = {Using Narrowing in the Analysis of Key Management Protocols}, booktitle = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 1-3, 1989}, pages = {138--147}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SECPRI.1989.36288}, doi = {10.1109/SECPRI.1989.36288}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FroscherM88, author = {Judith N. Froscher and Catherine Meadows}, editor = {Carl E. Landwehr}, title = {Achieving a Trusted Database Management System Using Parallelism}, booktitle = {Database Security, {II:} Status and Prospects. Result of the {IFIP} {WG} 11.3 Workshop on Database Security, Kingston, Ontario, Canada, October 5-7, 1988}, pages = {151--160}, publisher = {North-Holland}, year = {1988}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/FroscherM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/MeadowsM87, author = {Catherine Meadows and David Mutchler}, title = {Matching Secrets in the Absence of a Continuously Available Trusted Authority}, journal = {{IEEE} Trans. Software Eng.}, volume = {13}, number = {2}, pages = {289--292}, year = {1987}, url = {https://doi.org/10.1109/TSE.1987.233152}, doi = {10.1109/TSE.1987.233152}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/MeadowsM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MeadowsJ87, author = {Catherine Meadows and Sushil Jajodia}, editor = {Carl E. Landwehr}, title = {Integrity Versus Security in Multi-Level Secure Databases}, booktitle = {Database Security: Status and Prospects. Results of the {IFIP} {WG} 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987}, pages = {89--101}, publisher = {North-Holland}, year = {1987}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MeadowsJ87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/JajodiaM87, author = {Sushil Jajodia and Catherine A. Meadows}, title = {Mutual Consistency in Decentralized Distributed Systems}, booktitle = {Proceedings of the Third International Conference on Data Engineering, February 3-5, 1987, Los Angeles, California, {USA}}, pages = {396--404}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://doi.org/10.1109/ICDE.1987.7272405}, doi = {10.1109/ICDE.1987.7272405}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/JajodiaM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows87, author = {Catherine Meadows}, title = {The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels}, booktitle = {Proceedings of the 1987 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 27-29, 1987}, pages = {212--219}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://doi.org/10.1109/SP.1987.10008}, doi = {10.1109/SP.1987.10008}, timestamp = {Thu, 21 Sep 2023 15:57:33 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Meadows86, author = {Catherine Meadows}, title = {A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party}, booktitle = {Proceedings of the 1986 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 7-9, 1986}, pages = {134--137}, publisher = {{IEEE} Computer Society}, year = {1986}, url = {https://doi.org/10.1109/SP.1986.10022}, doi = {10.1109/SP.1986.10022}, timestamp = {Thu, 21 Sep 2023 15:57:33 +0200}, biburl = {https://dblp.org/rec/conf/sp/Meadows86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlakleyMP85, author = {G. R. Blakley and Catherine Meadows and George B. Purdy}, editor = {Hugh C. Williams}, title = {Fingerprinting Long Forgiving Messages}, booktitle = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {218}, pages = {180--189}, publisher = {Springer}, year = {1985}, url = {https://doi.org/10.1007/3-540-39799-X\_15}, doi = {10.1007/3-540-39799-X\_15}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlakleyMP85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlakleyM85, author = {G. R. Blakley and Catherine Meadows}, title = {A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data}, booktitle = {1985 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April 22-24, 1985}, pages = {116--122}, publisher = {{IEEE} Computer Society}, year = {1985}, url = {https://doi.org/10.1109/SP.1985.10024}, doi = {10.1109/SP.1985.10024}, timestamp = {Thu, 21 Sep 2023 15:57:33 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlakleyM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlakleyM84, author = {G. R. Blakley and Catherine Meadows}, editor = {G. R. Blakley and David Chaum}, title = {Security of Ramp Schemes}, booktitle = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {196}, pages = {242--268}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39568-7\_20}, doi = {10.1007/3-540-39568-7\_20}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlakleyM84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.