Seguir
Catherine Meadows
Catherine Meadows
Head, Formal Methods Section, Naval Research Laboratory
Dirección de correo verificada de nrl.navy.mil
Título
Citado por
Citado por
Año
The NRL protocol analyzer: An overview
C Meadows
The Journal of Logic Programming 26 (2), 113-131, 1996
7541996
Security of ramp schemes
GR Blakley, C Meadows
Advances in Cryptology, 242-268, 1985
5731985
Formal verification of cryptographic protocols: A survey
CA Meadows
International Conference on the Theory and Application of Cryptology, 133-150, 1994
3821994
Three systems for cryptographic protocol analysis
R Kemmerer, C Meadows, J Millen
Journal of CRYPTOLOGY 7 (2), 79-130, 1994
3531994
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows
IEEE journal on selected areas in communications 21 (1), 44-54, 2003
3292003
Maude-NPA: Cryptographic protocol analysis modulo equational properties
S Escobar, C Meadows, J Meseguer
Foundations of Security Analysis and Design V, 1-50, 2009
2962009
A formal framework and evaluation method for network denial of service
C Meadows
Proceedings of the 12th IEEE computer security foundations workshop, 4-13, 1999
2701999
Applying formal methods to the analysis of a key management protocol
C Meadows
Journal of Computer Security 1 (1), 5-35, 1992
2681992
Applying formal methods to the analysis of a key management protocol
CA Meadows
NAVAL RESEARCH LAB WASHINGTON DC, 1990
2681990
A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party
C Meadows
IEEE Symposium on Security and Privacy, 134-137, 1986
2461986
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
C Meadows
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
2331999
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005
2202005
A cost-based framework for analysis of denial of service in networks
C Meadows
Journal of Computer Security 9 (1-2), 143-164, 2001
1942001
Open issues in formal methods for cryptographic protocol analysis
C Meadows
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
1812000
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
CA Meadows
European Symposium on Research in Computer Security, 351-364, 1996
1741996
Fingerprinting long forgiving messages
GR Blakley, C Meadows, GB Purdy
Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986
1591986
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
S Escobar, C Meadows, J Meseguer
Theoretical Computer Science 367 (1-2), 162-202, 2006
1462006
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1362018
Model Checking Security Protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1362018
A system for the specification and verification of key management protocols
C Meadows
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
1161991
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20