Catherine Meadows Coauthor index DBLP Vis pubzone.org

List of publications from the DBLP Bibliography Server - FAQ
Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

DBLP keys2009
66Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLS. Santiago, Carolyn L. Talcott, Santiago Escobar, Catherine Meadows, José Meseguer: A Graphical User Interface for Maude-NPA. Electr. Notes Theor. Comput. Sci. 258(1): 3-20 (2009)
2008
65Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSantiago Escobar, Catherine Meadows, José Meseguer: State Space Reduction in the Maude-NRL Protocol Analyzer. ESORICS 2008: 548-562
2007
64no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLFrank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore: Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings Springer 2007
63Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSantiago Escobar, Catherine Meadows, José Meseguer: Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. FOSAD 2007: 1-50
62Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSantiago Escobar, Catherine Meadows, José Meseguer: Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. Electr. Notes Theor. Comput. Sci. 171(4): 23-36 (2007)
61Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIliano Cervesato, Catherine Meadows: One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. IEEE Trans. Dependable Sec. Comput. 4(3): 216-227 (2007)
2006
60Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLDusko Pavlovic, Catherine Meadows: Deriving Secrecy in Key Establishment Protocols. ESORICS 2006: 384-403
59Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSantiago Escobar, Catherine Meadows, José Meseguer: A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1-2): 162-202 (2006)
2005
58no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLVijay Atluri, Catherine Meadows, Ari Juels: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 ACM 2005
57no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005 ACM 2005
56Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLIliano Cervesato, Catherine Meadows, Dusko Pavlovic: An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. CSFW 2005: 48-61
55Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSantiago Escobar, Catherine Meadows, José Meseguer: A rewriting-based inference system for the NRL protocol analyzer: grammar generation. FMSE 2005: 1-12
54Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristopher Lynch, Catherine Meadows: On the Relative Soundness of the Free Algebra Model for Public Key Encryption. Electr. Notes Theor. Comput. Sci. 125(1): 43-54 (2005)
2004
53Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, Dusko Pavlovic: Deriving, Attacking and Defending the GDOI Protocol. ESORICS 2004: 53-72
52Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLChristopher Lynch, Catherine Meadows: Sound Approximations to Diffie-Hellman Using Rewrite Rules. ICICS 2004: 262-277
51no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, Paul F. Syverson, Iliano Cervesato: Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. Journal of Computer Security 12(6): 893-931 (2004)
50Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. Sci. Comput. Program. 50(1-3): 3-22 (2004)
2003
49Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: A Procedure for Verifying Security Against Type Confusion Attacks. CSFW 2003: 62-
48Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. ESOP 2003: 10-21
47Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLMichael Backes, Catherine Meadows, John C. Mitchell: Relating cryptography and formal methods: a panel. FMSE 2003: 61-66
2002
46Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRan Canetti, Catherine Meadows, Paul F. Syverson: Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355
45Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Using a Declarative Language to Build an Experimental Analysis Tool. PADL 2002: 1-2
2001
44Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, Paul F. Syverson: Formalizing GDOI group key management requirements in NPATRL. ACM Conference on Computer and Communications Security 2001: 235-244
43Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Open Issues in Formal Methods for Cryptographic Protocol Analysis. MMM-ACNS 2001: 21
42no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: A Cost-Based Framework for Analysis of Denial of Service Networks. Journal of Computer Security 9(1/2): 143-164 (2001)
2000
41no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. CAV 2000: 2
40Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Invariant Generation Techniques in Cryptographic Protocol Analysis. CSFW 2000: 159-167
1999
39Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: A Formal Framework and Evaluation Method for Network Denial of Service. CSFW 1999: 4-13
38Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. IEEE Symposium on Security and Privacy 1999: 216-231
37Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, Dennis M. Volpano: The MFPS XV Security Session. Electr. Notes Theor. Comput. Sci. 20: (1999)
36Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, William H. Sanders: Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). IEEE Trans. Software Eng. 25(5): 601-602 (1999)
1998
35no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings Springer 1998
34Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRoberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine Meadows: Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82
33Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, Paul F. Syverson: A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140
1997
32Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Languages for Formal Specification of Security Protocols. CSFW 1997: 96-97
1996
31Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Language generation and verification in the NRL protocol analyzer. CSFW 1996: 48-61
30Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. ESORICS 1996: 351-364
29no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, Ira S. Moskowitz: Covert Channels - A Context-Based View. Information Hiding 1996: 73-93
28no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul F. Syverson, Catherine Meadows: A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptography 7(1-2): 27-59 (1996)
27Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. IEEE Trans. Software Eng. 22(5): 281-282 (1996)
26no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: The NRL Protocol Analyzer: An Overview. J. Log. Program. 26(2): 113-131 (1996)
1995
25no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLGustavus J. Simmons, Catherine Meadows: The Role of Trust in Information Integrity Protocols. Journal of Computer Security 3(1): 71-84 (1995)
1994
24Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Formal Verification of Cryptographic Protocols: A Survey. ASIACRYPT 1994: 135-150
23no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: A Model of Computation for the NRL Protocol Analyzer. CSFW 1994: 84-89
22Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLPaul F. Syverson, Catherine Meadows: Formal Requirements for Key Distribution Protocols. EUROCRYPT 1994: 320-331
21no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLRichard A. Kemmerer, Catherine Meadows, Jonathan K. Millen: Three System for Cryptographic Protocol Analysis. J. Cryptology 7(2): 79-130 (1994)
1992
20no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Panel: Fundamental Questions about Formal Methods. CSFW 1992: 52
19no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Applying Formal Methods to the Analysis of a Key Management Protocol. Journal of Computer Security 1(1): 5-36 (1992)
1991
18no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: The NRL Protocol Analysis Tool: A Position Paper. CSFW 1991: 227
17no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Panel Discussion on the Polyinstantiation Problem: An Introduction. CSFW 1991: 234
16no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Discussion Summary. DBSec 1991: 387-397
15no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: A System for the Specification and Verification of Key Management Protocols. IEEE Symposium on Security and Privacy 1991: 182-197
1990
14no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Representing Partial Knowledge in an Algebraic Security Model. CSFW 1990: 23-31
13no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Policies for Dynamic Upgrading. DBSec 1990: 241-250
12no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Discussion Summary. DBSec 1990: 395-404
11no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Extending the Brewer-Nash Model to a Multilevel Context. IEEE Symposium on Security and Privacy 1990: 95-103
1989
10no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Constructing Containers Using a Multilevel Relational Data Model. DBSec 1989: 127-141
9no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: Using Narrowing in the Analysis of Key Management Protocols. IEEE Symposium on Security and Privacy 1989: 138-147
1988
8no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLJudith N. Froscher, Catherine Meadows: Achieving a Trusted Database Management System Using Parallelism. DBSec 1988: 151-160
1987
7no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, Sushil Jajodia: Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101
6Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLSushil Jajodia, Catherine Meadows: Mutual Consistency in Decentralized Distributed Systems. ICDE 1987: 396-404
5no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels. IEEE Symposium on Security and Privacy 1987: 212-219
4no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows, David Mutchler: Matching Secrets in the Absence of a Continuously Available Trusted Authority. IEEE Trans. Software Eng. 13(2): 289-292 (1987)
1986
3no EE pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLCatherine Meadows: A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party. IEEE Symposium on Security and Privacy 1986: 134-137
1985
2Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLG. R. Blakley, Catherine Meadows, George B. Purdy: Fingerprinting Long Forgiving Messages. CRYPTO 1985: 180-189
1984
1Electronic Edition pubzone.org CiteSeerX Google scholar BibTeX bibliographical record in XMLG. R. Blakley, Catherine Meadows: Security of Ramp Schemes. CRYPTO 1984: 242-268

Coauthor Index

1Martín Abadi [34]
2Vijayalakshmi Atluri (Vijay Atluri) [58]
3Michael Backes [47]
4G. R. Blakley [1] [2]
5Ran Canetti [46]
6Srdjan Capkun [64]
7Iliano Cervesato [51] [56] [61]
8Yves Deswarte [35]
9Santiago Escobar [55] [59] [62] [63] [65] [66]
10Riccardo Focardi [34]
11Judith N. Froscher [8]
12Dieter Gollmann [34] [35]
13Roberto Gorrieri [34]
14Sushil Jajodia [6] [7]
15Ari Juels [58]
16Richard A. Kemmerer [21]
17Gavin Lowe [34]
18Christopher Lynch [52] [54]
19José Meseguer [55] [59] [62] [63] [65] [66]
20Jonathan K. Millen [21]
21John C. Mitchell [47]
22Tyler Moore [64]
23Ira S. Moskowitz [29]
24David Mutchler [4]
25Dusko Pavlovic [53] [56] [60]
26George B. Purdy [2]
27Jean-Jacques Quisquater [35]
28William H. Sanders [36]
29S. Santiago [66]
30Gustavus J. Simmons [25]
31Frank Stajano [64]
32Paul F. Syverson [22] [28] [33] [34] [44] [46] [51]
33Carolyn L. Talcott [66]
34Dennis M. Volpano [37]

Colors in the list of coauthors

Copyright © Fri Mar 12 12:56:28 2010 by Michael Ley (ley@uni-trier.de)