Catherine A. Meadows
Person information
- affiliation: Naval Research Laboratory (NRL), Washington DC, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2017
- [c74]Olga Chen, Catherine A. Meadows, Gautam Trivedi:
Stealthy Protocols: Metrics and Open Problems. Concurrency, Security, and Puzzles 2017: 1-17 - [i6]Catherine A. Meadows:
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption. IACR Cryptology ePrint Archive 2017: 1152 (2017) - 2016
- [c73]Fan Yang, Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago:
Strand spaces with choice via a process algebra semantics. PPDP 2016: 76-89 - [e9]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine A. Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9878, Springer 2016, ISBN 978-3-319-45743-7 [contents] - [e8]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine A. Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9879, Springer 2016, ISBN 978-3-319-45740-6 [contents] - [i5]Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Effective Sequential Protocol Composition in Maude-NPA. CoRR abs/1603.00087 (2016) - 2015
- [j26]Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran:
On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry. Logical Methods in Computer Science 11(2) (2015) - [c72]Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago:
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories. Programming Languages with Applications to Biology and Security 2015: 238-261 - [c71]Catherine A. Meadows:
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later. Logic, Rewriting, and Concurrency 2015: 475-492 - [c70]Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Analysis of the PKCS#11 API Using the Maude-NPA Tool. SSR 2015: 86-106 - 2014
- [j25]Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago:
State space reduction in the Maude-NRL Protocol Analyzer. Inf. Comput. 238: 157-186 (2014) - [c69]Serdar Erbatur, Deepak Kapur, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Christophe Ringeissen:
On Asymmetric Unification and the Combination Problem in Disjoint Theories. FoSSaCS 2014: 274-288 - [c68]Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago:
A rewriting-based forwards semantics for Maude-NPA. HotSoS 2014: 3 - [c67]Fan Yang, Santiago Escobar, Catherine A. Meadows, José Meseguer, Paliath Narendran:
Theories of Homomorphic Encryption, Unification, and the Finite Variant Property. PPDP 2014: 123-133 - [c66]Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Analysis of the IBM CCA Security API Protocols in Maude-NPA. SSR 2014: 111-130 - [c65]Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer:
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA. STM 2014: 162-177 - 2013
- [c64]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. CADE 2013: 231-248 - 2012
- [j24]Stephen D. Brookes, Achim Jung, Catherine A. Meadows, Michael W. Mislove, Prakash Panangaden:
Dedication. Electr. Notes Theor. Comput. Sci. 286: 3 (2012) - [j23]Hubert Comon-Lundh, Catherine A. Meadows:
Special Issue on Security and Rewriting Foreword. J. Autom. Reasoning 48(2): 133-134 (2012) - [c63]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. ESORICS 2012: 73-90 - [c62]Dusko Pavlovic, Catherine A. Meadows:
Actor-Network Procedures - (Extended Abstract). ICDCIT 2012: 7-26 - [c61]
- [e7]Catherine A. Meadows, M. Carmen Fernández Gago:
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7170, Springer 2012, ISBN 978-3-642-29962-9 [contents] - 2011
- [c60]Santiago Escobar, Deepak Kapur, Christopher Lynch, Catherine A. Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. PPDP 2011: 65-76 - [r6]Catherine A. Meadows:
Applications of Formal Methods to Intrusion Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 44-45 - [r5]Catherine A. Meadows:
Formal Analysis of Cryptographic Protocols. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 490-492 - [r4]Catherine A. Meadows:
Formal Methods in Certification and Evaluation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 498-499 - [r3]Catherine A. Meadows:
Program Verification and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 981-983 - [r2]Catherine A. Meadows:
Theorem Proving and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1285-1287 - [r1]Catherine A. Meadows:
Type Checking and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1342-1343 - [i4]Santiago Escobar, Catherine A. Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. CoRR abs/1105.5282 (2011) - [i3]Dusko Pavlovic, Catherine A. Meadows:
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions. CoRR abs/1106.0706 (2011) - [i2]Hubert Comon-Lundh, Ralf Küsters, Catherine A. Meadows:
Security and Rewriting (Dagstuhl Seminar 11332). Dagstuhl Reports 1(8): 53-66 (2011) - 2010
- [j22]Dusko Pavlovic, Catherine A. Meadows:
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. Electr. Notes Theor. Comput. Sci. 265: 97-122 (2010) - [c59]Santiago Escobar, Catherine A. Meadows, José Meseguer, Sonia Santiago:
Sequential Protocol Composition in Maude-NPA. ESORICS 2010: 303-318 - [c58]Aaron D. Jaggard, Catherine A. Meadows, Michael W. Mislove, Roberto Segala:
Reasoning about Probabilistic Security Using Task-PIOAs. ARSPA-WITS 2010: 2-22 - [c57]Ralf Sasse, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. STM 2010: 163-178
2000 – 2009
- 2009
- [j21]Sonia Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine A. Meadows, José Meseguer:
A Graphical User Interface for Maude-NPA. Electr. Notes Theor. Comput. Sci. 258(1): 3-20 (2009) - [j20]Catherine A. Meadows:
Introduction to ACM TISSEC special issue on CCS 2005. ACM Trans. Inf. Syst. Secur. 13(1): 1:1-1:2 (2009) - [c56]Dusko Pavlovic, Catherine A. Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 240-261 - [c55]Catherine A. Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 262-268 - [i1]Dusko Pavlovic, Catherine A. Meadows:
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol. CoRR abs/0910.5745 (2009) - 2008
- [c54]Santiago Escobar, Catherine A. Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. ESORICS 2008: 548-562 - 2007
- [j19]Santiago Escobar, Catherine A. Meadows, José Meseguer:
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. Electr. Notes Theor. Comput. Sci. 171(4): 23-36 (2007) - [j18]Iliano Cervesato, Catherine A. Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. IEEE Trans. Dependable Sec. Comput. 4(3): 216-227 (2007) - [c53]Santiago Escobar, Catherine A. Meadows, José Meseguer:
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. FOSAD 2007: 1-50 - [p1]Catherine A. Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul F. Syverson:
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 279-298 - [e6]Frank Stajano, Catherine A. Meadows, Srdjan Capkun, Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7 [contents] - 2006
- [j17]Santiago Escobar, Catherine A. Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1-2): 162-202 (2006) - [c52]Dusko Pavlovic, Catherine A. Meadows:
Deriving Secrecy in Key Establishment Protocols. ESORICS 2006: 384-403 - [c51]Catherine A. Meadows, Paul F. Syverson, LiWu Chang:
Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks. SecureComm 2006: 1-5 - 2005
- [j16]Christopher Lynch, Catherine A. Meadows:
On the Relative Soundness of the Free Algebra Model for Public Key Encryption. Electr. Notes Theor. Comput. Sci. 125(1): 43-54 (2005) - [c50]Santiago Escobar, Catherine A. Meadows, José Meseguer:
A rewriting-based inference system for the NRL protocol analyzer: grammar generation. FMSE 2005: 1-12 - [c49]Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic:
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. CSFW 2005: 48-61 - [c48]Loukas Lazos, Radha Poovendran, Catherine A. Meadows, Paul F. Syverson, LiWu Chang:
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. WCNC 2005: 1193-1199 - [e5]Vijay Atluri, Catherine A. Meadows, Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. ACM 2005, ISBN 1-59593-226-7 [contents] - [e4]Catherine A. Meadows:
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005. ACM 2005, ISBN 1-58113-980-2 [contents] - 2004
- [j15]Catherine A. Meadows, Paul F. Syverson, Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12(6): 893-931 (2004) - [j14]Catherine A. Meadows:
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. Sci. Comput. Program. 50(1-3): 3-22 (2004) - [c47]Catherine A. Meadows, Dusko Pavlovic:
Deriving, Attacking and Defending the GDOI Protocol. ESORICS 2004: 53-72 - [c46]Christopher Lynch, Catherine A. Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules. ICICS 2004: 262-277 - 2003
- [j13]Catherine A. Meadows:
Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21(1): 44-54 (2003) - [c45]Michael Backes, Catherine A. Meadows, John C. Mitchell:
Relating cryptography and formal methods: a panel. FMSE 2003: 61-66 - [c44]Catherine A. Meadows:
A Procedure for Verifying Security Against Type Confusion Attacks. CSFW 2003: 62- - [c43]Catherine A. Meadows:
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. ESOP 2003: 10-21 - 2002
- [c42]Ran Canetti, Catherine A. Meadows, Paul F. Syverson:
Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355 - [c41]Catherine A. Meadows:
Using a Declarative Language to Build an Experimental Analysis Tool. PADL 2002: 1-2 - 2001
- [j12]
- [j11]Catherine A. Meadows:
A Cost-Based Framework for Analysis of Denial of Service Networks. Journal of Computer Security 9(1/2): 143-164 (2001) - [c40]Catherine A. Meadows, Paul F. Syverson:
Formalizing GDOI group key management requirements in NPATRL. ACM Conference on Computer and Communications Security 2001: 235-244 - [c39]Catherine A. Meadows:
Open Issues in Formal Methods for Cryptographic Protocol Analysis. MMM-ACNS 2001: 21 - 2000
- [j10]Stuart G. Stubblebine, Catherine A. Meadows:
Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE Journal on Selected Areas in Communications 18(4): 571-581 (2000) - [c38]Catherine A. Meadows:
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. CAV 2000: 2 - [c37]Catherine A. Meadows:
Invariant Generation Techniques in Cryptographic Protocol Analysis. CSFW 2000: 159-167
1990 – 1999
- 1999
- [j9]Catherine A. Meadows, Dennis M. Volpano:
The MFPS XV Security Session. Electr. Notes Theor. Comput. Sci. 20: 76-79 (1999) - [j8]Catherine A. Meadows, William H. Sanders:
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). IEEE Trans. Software Eng. 25(5): 601-602 (1999) - [c36]Catherine A. Meadows:
A Formal Framework and Evaluation Method for Network Denial of Service. CSFW 1999: 4-13 - [c35]Catherine A. Meadows:
Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. IEEE Symposium on Security and Privacy 1999: 216-231 - 1998
- [c34]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine A. Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c33]Catherine A. Meadows, Paul F. Syverson:
A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140 - [e3]Jean-Jacques Quisquater, Yves Deswarte, Catherine A. Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [c32]
- [c31]
- 1996
- [j7]Paul F. Syverson, Catherine A. Meadows:
A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptography 7(1-2): 27-59 (1996) - [j6]Catherine A. Meadows:
The NRL Protocol Analyzer: An Overview. J. Log. Program. 26(2): 113-131 (1996) - [j5]Catherine A. Meadows:
Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. IEEE Trans. Software Eng. 22(5): 281-282 (1996) - [c30]Catherine A. Meadows:
Language generation and verification in the NRL protocol analyzer. CSFW 1996: 48-61 - [c29]Catherine A. Meadows:
A representation of protocol attacks for risk assessment. Network Threats 1996: 1-11 - [c28]Catherine A. Meadows:
Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. ESORICS 1996: 351-364 - [c27]Catherine A. Meadows, Ira S. Moskowitz:
Covert Channels - A Context-Based View. Information Hiding 1996: 73-93 - 1995
- [j4]Gustavus J. Simmons, Catherine A. Meadows:
The Role of Trust in Information Integrity Protocols. Journal of Computer Security 3(1): 71-84 (1995) - [c26]
- [e2]Hilary H. Hosmer, John E. Dobson, Catherine A. Meadows:
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA. IEEE Computer Society 1995, ISBN 0-8186-7318-4 [contents] - 1994
- [j3]Richard A. Kemmerer, Catherine A. Meadows, Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994) - [c25]Catherine A. Meadows:
Formal Verification of Cryptographic Protocols: A Survey. ASIACRYPT 1994: 135-150 - [c24]
- [c23]Paul F. Syverson, Catherine A. Meadows:
Formal Requirements for Key Distribution Protocols. EUROCRYPT 1994: 320-331 - 1993
- [c22]Catherine A. Meadows:
An outline of a taxonomy of computer security research and development. NSPW 1993: 33-35 - [c21]Paul Syverson, Catherine A. Meadows:
A logical language for specifying cryptographic protocol requirements. IEEE Symposium on Security and Privacy 1993: 165-177 - [e1]James Bret Michael, Victoria Ashby, Catherine A. Meadows:
Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA. ACM 1993, ISBN 0-8186-5430-9 [contents] - 1992
- [j2]Catherine A. Meadows:
Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security 1(1): 5-36 (1992) - [c20]
- [c19]Catherine A. Meadows:
Using traces based on procedure calls to reason about composability. IEEE Symposium on Security and Privacy 1992: 177-188 - 1991
- [c18]
- [c17]Catherine A. Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction. CSFW 1991: 234 - [c16]
- [c15]Catherine A. Meadows:
A System for the Specification and Verification of Key Management Protocols. IEEE Symposium on Security and Privacy 1991: 182-197 - 1990
- [c14]Catherine A. Meadows:
Representing Partial Knowledge in an Algebraic Security Model. CSFW 1990: 23-31 - [c13]
- [c12]
- [c11]Catherine A. Meadows:
Extending the Brewer-Nash Model to a Multilevel Context. IEEE Symposium on Security and Privacy 1990: 95-103
1980 – 1989
- 1989
- [c10]Catherine A. Meadows:
Constructing Containers Using a Multilevel Relational Data Model. DBSec 1989: 127-141 - [c9]Catherine A. Meadows:
Using Narrowing in the Analysis of Key Management Protocols. IEEE Symposium on Security and Privacy 1989: 138-147 - 1988
- [c8]Judith N. Froscher, Catherine A. Meadows:
Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160 - 1987
- [j1]Catherine A. Meadows, David Mutchler:
Matching Secrets in the Absence of a Continuously Available Trusted Authority. IEEE Trans. Software Eng. 13(2): 289-292 (1987) - [c7]Catherine A. Meadows, Sushil Jajodia:
Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101 - [c6]Sushil Jajodia, Catherine A. Meadows:
Mutual Consistency in Decentralized Distributed Systems. ICDE 1987: 396-404 - [c5]Catherine A. Meadows:
The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. IEEE Symposium on Security and Privacy 1987: 212-219 - 1986
- [c4]Catherine A. Meadows:
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. IEEE Symposium on Security and Privacy 1986: 134-137 - 1985
- [c3]G. R. Blakley, Catherine A. Meadows, George B. Purdy:
Fingerprinting Long Forgiving Messages. CRYPTO 1985: 180-189 - [c2]G. R. Blakley, Catherine A. Meadows:
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data. IEEE Symposium on Security and Privacy 1985: 116-122 - 1984
- [c1]
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-03-20 23:15 CET by the dblp team