


Остановите войну!
for scientists:


default search action
Catherine A. Meadows
Person information

- affiliation: Naval Research Laboratory (NRL), Washington DC, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c88]Dalton Chichester, Wei Du, Raymond Kauffman, Hai Lin, Christopher Lynch, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar, Luis Rovira, Brandon Rozek
:
CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms. GandALF 2022: 147-161 - 2021
- [c87]Damián Aparicio-Sánchez, Santiago Escobar, Catherine A. Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time and Space. Protocols, Strands, and Logic 2021: 22-49 - [c86]Hai Lin
, Christopher Lynch
, Andrew M. Marshall
, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar
, Brandon Rozek
:
Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems. FroCoS 2021: 253-270 - 2020
- [c85]Olga Chen
, Aaron D. Jaggard, Catherine A. Meadows, Michael C. Shlanta:
NExtSteP: An Extensible Testbed for Network Covert Channels. CNS 2020: 1-9 - [c84]Damián Aparicio-Sánchez, Santiago Escobar
, Catherine A. Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time. INDOCRYPT 2020: 128-150 - [i11]Damián Aparicio-Sánchez, Santiago Escobar, Catherine A. Meadows, José Meseguer, Julia Sapiña:
Protocol Analysis with Time. CoRR abs/2010.13707 (2020) - [i10]Catherine A. Meadows:
Symbolic and Computational Reasoning About Cryptographic Modes of Operation. IACR Cryptol. ePrint Arch. 2020: 794 (2020)
2010 – 2019
- 2019
- [c83]Christopher Lynch
, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar:
On Asymmetric Unification for the Theory of XOR with a Homomorphism. FroCos 2019: 297-312 - [i9]Fan Yang, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Strand Spaces with Choice via a Process Algebra Semantics. CoRR abs/1904.09946 (2019) - [i8]Christopher Lynch, Andrew M. Marshall
, Catherine A. Meadows, Paliath Narendran, Veena Ravishankar:
On Asymmetric Unification for the Theory of XOR with a Homomorphism. CoRR abs/1907.00227 (2019) - 2018
- [c82]Antonio González-Burgueño, Damián Aparicio-Sánchez, Santiago Escobar
, Catherine A. Meadows, José Meseguer:
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA. LPAR 2018: 400-417 - [c81]Fan Yang, Santiago Escobar
, Catherine A. Meadows, José Meseguer:
Modular Verification of Sequential Composition for Private Channels in Maude-NPA. STM 2018: 20-36 - [p2]David A. Basin, Cas Cremers, Catherine A. Meadows:
Model Checking Security Protocols. Handbook of Model Checking 2018: 727-762 - [i7]Antonio González-Burgueño, Damián Aparicio, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA. CoRR abs/1806.07209 (2018) - 2017
- [c80]Olga Chen
, Catherine A. Meadows, Gautam Trivedi:
Stealthy Protocols: Metrics and Open Problems. Concurrency, Security, and Puzzles 2017: 1-17 - [i6]Catherine A. Meadows:
Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption. IACR Cryptol. ePrint Arch. 2017: 1152 (2017) - 2016
- [c79]Fan Yang, Santiago Escobar
, Catherine A. Meadows, José Meseguer, Sonia Santiago:
Strand spaces with choice via a process algebra semantics. PPDP 2016: 76-89 - [e9]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine A. Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I. Lecture Notes in Computer Science 9878, Springer 2016, ISBN 978-3-319-45743-7 [contents] - [e8]Ioannis G. Askoxylakis, Sotiris Ioannidis, Sokratis K. Katsikas, Catherine A. Meadows:
Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9879, Springer 2016, ISBN 978-3-319-45740-6 [contents] - [i5]Sonia Santiago, Santiago Escobar, Catherine A. Meadows, José Meseguer:
Effective Sequential Protocol Composition in Maude-NPA. CoRR abs/1603.00087 (2016) - 2015
- [j20]Andrew M. Marshall
, Catherine A. Meadows, Paliath Narendran:
On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry. Log. Methods Comput. Sci. 11(2) (2015) - [c78]Santiago Escobar
, Catherine A. Meadows, José Meseguer, Sonia Santiago
:
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories. Programming Languages with Applications to Biology and Security 2015: 238-261 - [c77]Catherine A. Meadows:
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later. Logic, Rewriting, and Concurrency 2015: 475-492 - [c76]Antonio González-Burgueño, Sonia Santiago
, Santiago Escobar
, Catherine A. Meadows, José Meseguer:
Analysis of the PKCS#11 API Using the Maude-NPA Tool. SSR 2015: 86-106 - 2014
- [j19]Santiago Escobar
, Catherine A. Meadows, José Meseguer, Sonia Santiago
:
State space reduction in the Maude-NRL Protocol Analyzer. Inf. Comput. 238: 157-186 (2014) - [c75]Serdar Erbatur, Deepak Kapur, Andrew M. Marshall, Catherine A. Meadows, Paliath Narendran, Christophe Ringeissen:
On Asymmetric Unification and the Combination Problem in Disjoint Theories. FoSSaCS 2014: 274-288 - [c74]Santiago Escobar
, Catherine A. Meadows, José Meseguer, Sonia Santiago:
A rewriting-based forwards semantics for Maude-NPA. HotSoS 2014: 3 - [c73]Fan Yang, Santiago Escobar
, Catherine A. Meadows, José Meseguer, Paliath Narendran:
Theories of Homomorphic Encryption, Unification, and the Finite Variant Property. PPDP 2014: 123-133 - [c72]Antonio González-Burgueño, Sonia Santiago
, Santiago Escobar
, Catherine A. Meadows, José Meseguer:
Analysis of the IBM CCA Security API Protocols in Maude-NPA. SSR 2014: 111-130 - [c71]Sonia Santiago
, Santiago Escobar
, Catherine A. Meadows, José Meseguer:
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA. STM 2014: 162-177 - 2013
- [c70]Serdar Erbatur, Santiago Escobar
, Deepak Kapur, Zhiqiang Liu, Christopher Lynch
, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago
, Ralf Sasse:
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis. CADE 2013: 231-248 - 2012
- [j18]Hubert Comon-Lundh, Catherine A. Meadows:
Special Issue on Security and Rewriting Foreword. J. Autom. Reason. 48(2): 133-134 (2012) - [c69]Serdar Erbatur, Santiago Escobar
, Deepak Kapur, Zhiqiang Liu, Christopher Lynch
, Catherine A. Meadows, José Meseguer, Paliath Narendran, Sonia Santiago
, Ralf Sasse
:
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions. ESORICS 2012: 73-90 - [c68]Dusko Pavlovic
, Catherine A. Meadows:
Actor-Network Procedures - (Extended Abstract). ICDCIT 2012: 7-26 - [c67]Catherine A. Meadows, Dusko Pavlovic
:
Formalizing Physical Security Procedures. STM 2012: 193-208 - [c66]Stephen D. Brookes, Achim Jung, Catherine A. Meadows, Michael W. Mislove, Prakash Panangaden:
Dedication. MFPS 2012: 3 - [e7]Catherine A. Meadows, M. Carmen Fernández Gago:
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7170, Springer 2012, ISBN 978-3-642-29962-9 [contents] - 2011
- [c65]Santiago Escobar
, Deepak Kapur, Christopher Lynch
, Catherine A. Meadows, José Meseguer, Paliath Narendran, Ralf Sasse:
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption. PPDP 2011: 65-76 - [r6]Catherine A. Meadows:
Applications of Formal Methods to Intrusion Detection. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 44-45 - [r5]Catherine A. Meadows:
Formal Analysis of Cryptographic Protocols. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 490-492 - [r4]Catherine A. Meadows:
Formal Methods in Certification and Evaluation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 498-499 - [r3]Catherine A. Meadows:
Program Verification and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 981-983 - [r2]Catherine A. Meadows:
Theorem Proving and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1285-1287 - [r1]Catherine A. Meadows:
Type Checking and Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1342-1343 - [i4]Santiago Escobar, Catherine A. Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. CoRR abs/1105.5282 (2011) - [i3]Dusko Pavlovic, Catherine A. Meadows:
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions. CoRR abs/1106.0706 (2011) - [i2]Hubert Comon-Lundh, Ralf Küsters, Catherine A. Meadows:
Security and Rewriting (Dagstuhl Seminar 11332). Dagstuhl Reports 1(8): 53-66 (2011) - 2010
- [c64]Santiago Escobar
, Catherine A. Meadows, José Meseguer, Sonia Santiago
:
Sequential Protocol Composition in Maude-NPA. ESORICS 2010: 303-318 - [c63]Aaron D. Jaggard
, Catherine A. Meadows, Michael W. Mislove
, Roberto Segala
:
Reasoning about Probabilistic Security Using Task-PIOAs. ARSPA-WITS 2010: 2-22 - [c62]Ralf Sasse
, Santiago Escobar
, Catherine A. Meadows, José Meseguer:
Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA. STM 2010: 163-178 - [c61]Dusko Pavlovic
, Catherine A. Meadows:
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol. MFPS 2010: 97-122
2000 – 2009
- 2009
- [j17]Catherine A. Meadows:
Introduction to ACM TISSEC special issue on CCS 2005. ACM Trans. Inf. Syst. Secur. 13(1): 1:1-1:2 (2009) - [c60]Dusko Pavlovic, Catherine A. Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 240-261 - [c59]Catherine A. Meadows:
Deriving Ephemeral Authentication Using Channel Axioms. Security Protocols Workshop 2009: 262-268 - [c58]Sonia Santiago
, Carolyn L. Talcott, Santiago Escobar
, Catherine A. Meadows, José Meseguer:
A Graphical User Interface for Maude-NPA. PROLE 2009: 3-20 - [i1]Dusko Pavlovic, Catherine A. Meadows:
Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol. CoRR abs/0910.5745 (2009) - 2008
- [c57]Santiago Escobar
, Catherine A. Meadows, José Meseguer:
State Space Reduction in the Maude-NRL Protocol Analyzer. ESORICS 2008: 548-562 - 2007
- [j16]Iliano Cervesato
, Catherine A. Meadows:
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements. IEEE Trans. Dependable Secur. Comput. 4(3): 216-227 (2007) - [c56]Santiago Escobar
, Catherine A. Meadows, José Meseguer:
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties. FOSAD 2007: 1-50 - [p1]Catherine A. Meadows, Radha Poovendran, Dusko Pavlovic, LiWu Chang, Paul F. Syverson:
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 279-298 - [e6]Frank Stajano, Catherine A. Meadows, Srdjan Capkun, Tyler Moore:
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings. Lecture Notes in Computer Science 4572, Springer 2007, ISBN 978-3-540-73274-7 [contents] - 2006
- [j15]Santiago Escobar
, Catherine A. Meadows, José Meseguer:
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties. Theor. Comput. Sci. 367(1-2): 162-202 (2006) - [c55]Dusko Pavlovic, Catherine A. Meadows:
Deriving Secrecy in Key Establishment Protocols. ESORICS 2006: 384-403 - [c54]Catherine A. Meadows, Paul F. Syverson, LiWu Chang:
Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks. SecureComm 2006: 1-5 - [c53]Santiago Escobar
, Catherine A. Meadows, José Meseguer:
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer. SecReT@ICALP 2006: 23-36 - 2005
- [c52]Santiago Escobar
, Catherine A. Meadows, José Meseguer:
A rewriting-based inference system for the NRL protocol analyzer: grammar generation. FMSE 2005: 1-12 - [c51]Iliano Cervesato, Catherine A. Meadows, Dusko Pavlovic:
An Encapsulated Authentication Logic for Reasoning about Key Distribution Protocols. CSFW 2005: 48-61 - [c50]Loukas Lazos, Radha Poovendran, Catherine A. Meadows, Paul F. Syverson, LiWu Chang:
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. WCNC 2005: 1193-1199 - [e5]Vijay Atluri, Catherine A. Meadows, Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. ACM 2005, ISBN 1-59593-226-7 [contents] - [e4]Catherine A. Meadows:
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, WITS 2005, Long Beach, California, USA, January 10-11, 2005. ACM 2005, ISBN 1-58113-980-2 [contents] - 2004
- [j14]Catherine A. Meadows, Paul F. Syverson, Iliano Cervesato:
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer. J. Comput. Secur. 12(6): 893-931 (2004) - [j13]Catherine A. Meadows:
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols. Sci. Comput. Program. 50(1-3): 3-22 (2004) - [c49]Catherine A. Meadows, Dusko Pavlovic:
Deriving, Attacking and Defending the GDOI Protocol. ESORICS 2004: 53-72 - [c48]Christopher Lynch, Catherine A. Meadows:
Sound Approximations to Diffie-Hellman Using Rewrite Rules. ICICS 2004: 262-277 - [c47]Christopher Lynch
, Catherine A. Meadows:
On the Relative Soundness of the Free Algebra Model for Public Key Encryption. ARSPA@IJCAR 2004: 43-54 - 2003
- [j12]Catherine A. Meadows:
Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE J. Sel. Areas Commun. 21(1): 44-54 (2003) - [c46]Michael Backes, Catherine A. Meadows, John C. Mitchell:
Relating cryptography and formal methods: a panel. FMSE 2003: 61-66 - [c45]Catherine A. Meadows:
A Procedure for Verifying Security Against Type Confusion Attacks. CSFW 2003: 62- - [c44]Catherine A. Meadows:
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis. ESOP 2003: 10-21 - 2002
- [c43]Ran Canetti, Catherine A. Meadows, Paul F. Syverson:
Environmental Requirements for Authentication Protocols. ISSS 2002: 339-355 - [c42]Catherine A. Meadows:
Using a Declarative Language to Build an Experimental Analysis Tool. PADL 2002: 1-2 - 2001
- [j11]Dieter Gollmann, Catherine A. Meadows, Eiji Okamoto:
Editorial. Int. J. Inf. Sec. 1(1): 1-2 (2001) - [j10]Catherine A. Meadows:
A Cost-Based Framework for Analysis of Denial of Service Networks. J. Comput. Secur. 9(1/2): 143-164 (2001) - [c41]Catherine A. Meadows, Paul F. Syverson:
Formalizing GDOI group key management requirements in NPATRL. CCS 2001: 235-244 - [c40]Catherine A. Meadows:
Open Issues in Formal Methods for Cryptographic Protocol Analysis. MMM-ACNS 2001: 21 - 2000
- [j9]Stuart G. Stubblebine, Catherine A. Meadows:
Formal characterization and automated analysis of known-pair and chosen-text attacks. IEEE J. Sel. Areas Commun. 18(4): 571-581 (2000) - [c39]Catherine A. Meadows:
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis. CAV 2000: 2 - [c38]Catherine A. Meadows:
Invariant Generation Techniques in Cryptographic Protocol Analysis. CSFW 2000: 159-167
1990 – 1999
- 1999
- [j8]Catherine A. Meadows, William H. Sanders:
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6). IEEE Trans. Software Eng. 25(5): 601-602 (1999) - [c37]Catherine A. Meadows:
A Formal Framework and Evaluation Method for Network Denial of Service. CSFW 1999: 4-13 - [c36]Catherine A. Meadows:
Analysis of the Internet Key Exchange Protocol using the NRL Protocol Analyzer. IEEE Symposium on Security and Privacy 1999: 216-231 - [c35]Catherine A. Meadows, Dennis M. Volpano:
The MFPS XV Security Session. MFPS 1999: 76-79 - 1998
- [c34]Roberto Gorrieri, Paul F. Syverson, Martín Abadi, Riccardo Focardi, Dieter Gollmann, Gavin Lowe, Catherine A. Meadows:
Panel Introduction: Varieties of Authentication. CSFW 1998: 79-82 - [c33]Catherine A. Meadows, Paul F. Syverson:
A Formal Specification of Requirements for Payment Transactions in the SET Protocol. Financial Cryptography 1998: 122-140 - [e3]Jean-Jacques Quisquater, Yves Deswarte, Catherine A. Meadows, Dieter Gollmann:
Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings. Lecture Notes in Computer Science 1485, Springer 1998, ISBN 3-540-65004-0 [contents] - 1997
- [c32]Catherine A. Meadows:
Languages for Formal Specification of Security Protocols. CSFW 1997: 96-97 - [c31]Catherine A. Meadows:
Three paradigms in computer security. NSPW 1997: 34-37 - 1996
- [j7]Paul F. Syverson, Catherine A. Meadows:
A Formal Language for Cryptographic Protocol Requirements. Des. Codes Cryptogr. 7(1-2): 27-59 (1996) - [j6]Catherine A. Meadows:
The NRL Protocol Analyzer: An Overview. J. Log. Program. 26(2): 113-131 (1996) - [j5]Catherine A. Meadows:
Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy. IEEE Trans. Software Eng. 22(5): 281-282 (1996) - [c30]Catherine A. Meadows:
Language generation and verification in the NRL protocol analyzer. CSFW 1996: 48-61 - [c29]Catherine A. Meadows:
A representation of protocol attacks for risk assessment. Network Threats 1996: 1-10 - [c28]Catherine A. Meadows:
Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. ESORICS 1996: 351-364 - [c27]Catherine A. Meadows, Ira S. Moskowitz:
Covert Channels - A Context-Based View. Information Hiding 1996: 73-93 - 1995
- [j4]Gustavus J. Simmons, Catherine A. Meadows:
The Role of Trust in Information Integrity Protocols. J. Comput. Secur. 3(1): 71-84 (1995) - [c26]Catherine A. Meadows:
Applying the dependability paradigm to computer security. NSPW 1995: 75-79 - [e2]Hilary H. Hosmer, John E. Dobson, Catherine A. Meadows:
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA. IEEE Computer Society 1995, ISBN 0-8186-7318-4 [contents] - 1994
- [j3]Richard A. Kemmerer, Catherine A. Meadows, Jonathan K. Millen:
Three System for Cryptographic Protocol Analysis. J. Cryptol. 7(2): 79-130 (1994) - [c25]Catherine A. Meadows:
Formal Verification of Cryptographic Protocols: A Survey. ASIACRYPT 1994: 135-150 - [c24]Catherine A. Meadows:
A Model of Computation for the NRL Protocol Analyzer. CSFW 1994: 84-89 - [c23]Paul F. Syverson, Catherine A. Meadows:
Formal Requirements for Key Distribution Protocols. EUROCRYPT 1994: 320-331 - 1993
- [c22]Catherine A. Meadows:
An outline of a taxonomy of computer security research and development. NSPW 1993: 33-35 - [c21]Paul Syverson, Catherine A. Meadows:
A logical language for specifying cryptographic protocol requirements. IEEE Symposium on Security and Privacy 1993: 165-177 - [e1]James Bret Michael, Victoria Ashby, Catherine A. Meadows:
Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA. ACM 1993, ISBN 0-8186-5430-9 [contents] - 1992
- [j2]Catherine A. Meadows:
Applying Formal Methods to the Analysis of a Key Management Protocol. J. Comput. Secur. 1(1): 5-36 (1992) - [c20]Catherine A. Meadows:
Panel: Fundamental Questions about Formal Methods. CSFW 1992: 52 - [c19]Catherine A. Meadows:
Using traces based on procedure calls to reason about composability. IEEE Symposium on Security and Privacy 1992: 177-188 - 1991
- [c18]Catherine A. Meadows:
The NRL Protocol Analysis Tool: A Position Paper. CSFW 1991: 227 - [c17]Catherine A. Meadows:
Panel Discussion on the Polyinstantiation Problem: An Introduction. CSFW 1991: 234 - [c16]Catherine A. Meadows:
Discussion Summary. DBSec 1991: 387-397 - [c15]