default search action
Catherine Meadows 0001
Catherine A. Meadows
Person information
- affiliation: Naval Research Laboratory (NRL), Washington, DC, USA
Other persons with the same name
- Catherine Meadows 0002 — George Washington University, Washington, DC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i12]Aaron D. Jaggard, Paul Syverson, Catherine Meadows:
A Logic of Sattestation. CoRR abs/2405.01809 (2024) - 2023
- [c96]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Strand Spaces with Choice via a Process Algebra Semantics. Analysis, Verification and Transformation for Declarative Programming and Intelligent Systems 2023: 307-350 - [c95]D. Galán, Víctor García, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Protocol Dialects as Formal Patterns. ESORICS (2) 2023: 42-61 - 2022
- [c94]Catherine Meadows:
Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results. CODASPY 2022: 2-3 - [c93]Dalton Chichester, Wei Du, Raymond Kauffman, Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Luis Rovira, Brandon Rozek:
CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms. GandALF 2022: 147-161 - 2021
- [c92]Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time and Space. Protocols, Strands, and Logic 2021: 22-49 - [c91]Catherine Meadows:
Moving the Bar on Computationally Sound Exclusive-Or. ESORICS (2) 2021: 275-295 - [c90]Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Brandon Rozek:
Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems. FroCoS 2021: 253-270 - 2020
- [c89]Olga Chen, Aaron D. Jaggard, Catherine Meadows, Michael C. Shlanta:
NExtSteP: An Extensible Testbed for Network Covert Channels. CNS 2020: 1-9 - [c88]Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time. INDOCRYPT 2020: 128-150 - [c87]Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar, Brandon Rozek:
Algorithmic Problems in Synthesized Cryptosystems (Extended Abstract). UNIF 2020: 10:1-10:6 - [i11]Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time. CoRR abs/2010.13707 (2020) - [i10]Catherine Meadows:
Symbolic and Computational Reasoning About Cryptographic Modes of Operation. IACR Cryptol. ePrint Arch. 2020: 794 (2020)
2010 – 2019
- 2019
- [c86]Christopher Lynch, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar:
On Asymmetric Unification for the Theory of XOR with a Homomorphism. FroCos 2019: 297-312 - [i9]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer:
Strand Spaces with Choice via a Process Algebra Semantics. CoRR abs/1904.09946 (2019) - [i8]Christopher Lynch, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Veena Ravishankar:
On Asymmetric Unification for the Theory of XOR with a Homomorphism. CoRR abs/1907.00227 (2019) - 2018
- [c85]Antonio González-Burgueño, Damián Aparicio-Sánchez, Santiago Escobar, Catherine Meadows, José Meseguer:
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA. LPAR 2018: 400-417 - [c84]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer:
Modular Verification of Sequential Composition for Private Channels in Maude-NPA. STM 2018: 20-36 - [p2]David A. Basin, Cas Cremers, Catherine Meadows:
Model Checking Security Protocols. Handbook of Model Checking 2018: 727-762 - [i7]Antonio González-Burgueño, Damián Aparicio, Santiago Escobar, Catherine Meadows, José Meseguer:
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA. CoRR abs/1806.07209 (2018) - 2017
- [c83]Olga Chen, Catherine Meadows, Gautam Trivedi:
Stealthy Protocols: Metrics and Open Problems. Concurrency, Security, and Puzzles 2017: 1-17 - [i6]Catherine Meadows:
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption. IACR Cryptol. ePrint Arch. 2017: 1152 (2017) - 2016
- [c82]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Strand spaces with choice via a process algebra semantics. PPDP 2016: 76-89 - [e9]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9878, Springer 2016, ISBN 978-3-319-45743-7 [contents] - [e8]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9879, Springer 2016, ISBN 978-3-319-45740-6 [contents] - [i5]Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
Effective Sequential Protocol Composition in Maude-NPA. CoRR abs/1603.00087 (2016) - 2015
- [j20]Andrew M. Marshall, Catherine Meadows, Paliath Narendran:
On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry. Log. Methods Comput. Sci. 11(2) (2015) - [c81]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories. Programming Languages with Applications to Biology and Security 2015: 238-261 - [c80]Catherine Meadows:
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later. Logic, Rewriting, and Concurrency 2015: 475-492 - [c79]Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
Analysis of the PKCS#11 API Using the Maude-NPA Tool. SSR 2015: 86-106 - 2014
- [j19]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
State space reduction in the Maude-NRL Protocol Analyzer. Inf. Comput. 238: 157-186 (2014) - [c78]Serdar Erbatur, Deepak Kapur, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Christophe Ringeissen:
On Asymmetric Unification and the Combination Problem in Disjoint Theories. FoSSaCS 2014: 274-288 - [c77]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
A rewriting-based forwards semantics for Maude-NPA. HotSoS 2014: 3 - [c76]Fan Yang, Santiago Escobar, Catherine Meadows, José Meseguer, Paliath Narendran:
Theories of Homomorphic Encryption, Unification, and the Finite Variant Property. PPDP 2014: 123-133 - [c75]Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
Analysis of the IBM CCA Security API Protocols in Maude-NPA. SSR 2014: 111-130 - [c74]Sonia Santiago, Santiago Escobar, Catherine Meadows, José Meseguer:
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA. STM 2014: 162-177 - [c73]Serdar Erbatur, Deepak Kapur, Andrew M. Marshall, Catherine Meadows, Paliath Narendran, Christophe Ringeissen:
On Asymmetric Unification and the Combination Problem in Disjoint Theories (Extended Abstract). UNIF 2014: 33-35 - 2013
- [c72]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. CADE 2013: 231-248 - 2012
- [j18]Hubert Comon-Lundh, Catherine Meadows:
Special Issue on Security and Rewriting Foreword. J. Autom. Reason. 48(2): 133-134 (2012) - [c71]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Sonia Santiago, Ralf Sasse:
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. ESORICS 2012: 73-90 - [c70]Dusko Pavlovic, Catherine Meadows:
Actor-Network Procedures - (Extended Abstract). ICDCIT 2012: 7-26 - [c69]Catherine Meadows, Dusko Pavlovic:
Formalizing Physical Security Procedures. STM 2012: 193-208 - [c68]Stephen D. Brookes, Achim Jung, Catherine Meadows, Michael W. Mislove, Prakash Panangaden:
Dedication. MFPS 2012: 3 - [e7]Catherine Meadows, M. Carmen Fernández Gago:
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7170, Springer 2012, ISBN 978-3-642-29962-9 [contents] - 2011
- [c67]Santiago Escobar, Deepak Kapur, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. PPDP 2011: 65-76 - [c66]Serdar Erbatur, Santiago Escobar, Deepak Kapur, Zhiqiang Liu, Christopher Lynch, Catherine Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. UNIF 2011: 59-64 - [r6]Catherine Meadows:
Applications of Formal Methods to Intrusion Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 44-45 - [r5]Catherine Meadows:
Formal Analysis of Cryptographic Protocols. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 490-492 - [r4]Catherine Meadows:
Formal Methods in Certification and Evaluation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 498-499 - [r3]Catherine Meadows:
Program Verification and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 981-983 - [r2]Catherine Meadows:
Theorem Proving and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1285-1287 - [r1]Catherine Meadows:
Type Checking and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1342-1343 - [i4]Santiago Escobar, Catherine Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. CoRR abs/1105.5282 (2011) - [i3]Dusko Pavlovic, Catherine Meadows:
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions. CoRR abs/1106.0706 (2011) - [i2]Hubert Comon-Lundh, Ralf Küsters, Catherine Meadows:
Security and Rewriting (Dagstuhl Seminar 11332). Dagstuhl Reports 1(8): 53-66 (2011) - 2010
- [c65]Santiago Escobar, Catherine Meadows, José Meseguer, Sonia Santiago:
Sequential Protocol Composition in Maude-NPA. ESORICS 2010: 303-318 - [c64]Aaron D. Jaggard, Catherine Meadows, Michael W. Mislove, Roberto Segala:
Reasoning about Probabilistic Security Using Task-PIOAs. ARSPA-WITS 2010: 2-22 - [c63]Ralf Sasse, Santiago Escobar, Catherine Meadows, José Meseguer:
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. STM 2010: 163-178 - [c62]Dusko Pavlovic, Catherine Meadows:
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. MFPS 2010: 97-122
2000 – 2009
- 2009
- [j17]Catherine Meadows:
Introduction to ACM TISSEC special issue on CCS 2005. ACM Trans. Inf. Syst. Secur. 13(1): 1:1-1:2 (2009) - [c61]Dusko Pavlovic, Catherine Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 240-261 - [c60]Catherine Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 262-268 - [c59]Sonia Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine Meadows, José Meseguer:
A Graphical User Interface for Maude-NPA. PROLE 2009: 3-20 - [i1]Dusko Pavlovic, Catherine Meadows:
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol. CoRR abs/0910.5745 (2009) - 2008
- [c58]Santiago Escobar, Catherine Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. ESORICS 2008: 548-562 - 2007
- [j16]Iliano Cervesato, Catherine Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. IEEE Trans. Dependable Secur. Comput. 4(3): 216-227 (2007) - [c57]Santiago Escobar, Catherine Meadows, José Meseguer:
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. FOSAD 2007: 1-50 - [p1]Catherine Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul F. Syverson:
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 279-298 - [e6]Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7 [contents] - 2006
- [j15]Santiago Escobar, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1-2): 162-202 (2006) - [c56]Dusko Pavlovic, Catherine Meadows:
Deriving Secrecy in Key Establishment Protocols. ESORICS 2006: 384-403 - [c55]Catherine Meadows, Paul F. Syverson, LiWu Chang:
Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks. SecureComm 2006: 1-5 - [c54]Santiago Escobar, Catherine Meadows, José Meseguer:
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. SecReT@ICALP 2006: 23-36 - 2005
- [c53]Santiago Escobar, Catherine Meadows, José Meseguer:
A rewriting-based inference system for the NRL protocol analyzer: grammar generation. FMSE 2005: 1-12 - [c52]Iliano Cervesato, Catherine Meadows, Dusko Pavlovic:
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. CSFW 2005: 48-61 - [c51]Loukas Lazos, Radha Poovendran, Catherine Meadows, Paul F. Syverson, LiWu Chang:
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. WCNC 2005: 1193-1199 - [e5]Vijay Atluri, Catherine Meadows, Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. ACM 2005, ISBN 1-59593-226-7 [contents] - [e4]Catherine Meadows:
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005. ACM 2005, ISBN 1-58113-980-2 [contents] - 2004
- [j14]Catherine Meadows, Paul F. Syverson, Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. J. Comput. Secur. 12(6): 893-931 (2004) - [j13]Catherine Meadows:
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. Sci. Comput. Program. 50(1-3): 3-22 (2004) - [c50]Catherine Meadows, Dusko Pavlovic:
Deriving, Attacking and Defending the GDOI Protocol. ESORICS 2004: 53-72 - [c49]Christopher Lynch, Catherine Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules. ICICS 2004: 262-277 - [c48]Christopher Lynch, Catherine Meadows:
On the Relative Soundness of the Free Algebra Model for Public Key Encryption. ARSPA@IJCAR 2004: 43-54 - 2003
- [j12]Catherine Meadows:
Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1): 44-54 (2003) - [c47]Michael Backes, Catherine Meadows, John C. Mitchell:
Relating cryptography and formal methods: a panel. FMSE 2003: 61-66 - [c46]Catherine Meadows:
A Procedure for Verifying Security Against Type Confusion Attacks. CSFW 2003: 62- - [c45]Catherine Meadows:
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. ESOP 2003: 10-21 - 2002
- [c44]Ran Canetti, Catherine Meadows, Paul F. Syverson:
Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355 - [c43]Catherine Meadows:
Using a Declarative Language to Build an Experimental Analysis Tool. PADL 2002: 1-2 - 2001
- [j11]Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto:
Editorial. Int. J. Inf. Sec. 1(1): 1-2 (2001) - [j10]Catherine Meadows:
A Cost-Based Framework for Analysis of Denial of Service Networks. J. Comput. Secur. 9(1/2): 143-164 (2001) - [c42]Catherine Meadows, Paul F. Syverson:
Formalizing GDOI group key management requirements in NPATRL. CCS 2001: 235-244 - [c41]Catherine Meadows:
Open Issues in Formal Methods for Cryptographic Protocol Analysis. MMM-ACNS 2001: 21 - [c40]Catherine Meadows:
Experiences in the Formal Analysis of the Group Domain of Interpretation Protocol (GDOI). VIS 2001: 147-150 - 2000
- [j9]Stuart G. Stubblebine, Catherine A. Meadows:
Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE J. Sel. Areas Commun. 18(4): 571-581 (2000) - [c39]Catherine Meadows:
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. CAV 2000: 2 - [c38]Catherine Meadows:
Invariant Generation Techniques in Cryptographic Protocol Analysis. CSFW 2000: 159-167
1990 – 1999
- 1999
- [j8]Catherine Meadows, William H. Sanders:
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). IEEE Trans. Software Eng. 25(5): 601-602 (1999) - [c37]Catherine Meadows:
A Formal Framework and Evaluation Method for Network Denial of Service. CSFW 1999: 4-13 - [c36]Catherine Meadows:
Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. S&P 1999: 216-231 - [c35]Catherine Meadows, Dennis M. Volpano:
The MFPS XV Security Session. MFPS 1999: 76-79 - 1998
- [c34]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c33]Catherine Meadows, Paul F. Syverson:
A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140 - [e3]Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [c32]Catherine Meadows:
Languages for Formal Specification of Security Protocols. CSFW 1997: 96-97 - [c31]Catherine Meadows:
Three paradigms in computer security. NSPW 1997: 34-37 - 1996
- [j7]Paul F. Syverson, Catherine Meadows:
A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptogr. 7(1-2): 27-59 (1996) - [j6]Catherine Meadows:
The NRL Protocol Analyzer: An Overview. J. Log. Program. 26(2): 113-131 (1996) - [j5]Catherine Meadows:
Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. IEEE Trans. Software Eng. 22(5): 281-282 (1996) - [c30]Catherine Meadows:
Language generation and verification in the NRL protocol analyzer. CSFW 1996: 48-61 - [c29]Catherine Meadows:
A representation of protocol attacks for risk assessment. Network Threats 1996: 1-10 - [c28]Catherine A. Meadows:
Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. ESORICS 1996: 351-364 - [c27]Catherine Meadows, Ira S. Moskowitz:
Covert Channels - A Context-Based View. Information Hiding 1996: 73-93 - 1995
- [j4]Gustavus J. Simmons, Catherine Meadows:
The Role of Trust in Information Integrity Protocols. J. Comput. Secur. 3(1): 71-84 (1995) - [c26]Catherine Meadows:
Applying the dependability paradigm to computer security. NSPW 1995: 75-79 - [e2]Hilary H. Hosmer, John E. Dobson, Catherine Meadows:
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA. IEEE Computer Society 1995, ISBN 0-8186-7318-4 [contents] - 1994
- [j3]Richard A. Kemmerer, Catherine Meadows, Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis. J. Cryptol. 7(2): 79-130 (1994) - [c25]