Catherine Meadows
Affiliations:- Naval Research Laboratory (NRL), Washington, DC, USA
According to our database1,
Catherine Meadows
authored at least 130 papers
between 1984 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on id.loc.gov
-
on asecolab.org
On csauthors.net:
Bibliography
2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Proceedings of the 13th International Symposium on Games, 2022
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
2021
Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems.
Proceedings of the Frontiers of Combining Systems - 13th International Symposium, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Protocols, Strands, and Logic, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 34th International Workshop on Unification, 2020
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Proceedings of the Frontiers of Combining Systems - 12th International Symposium, 2019
2018
Proceedings of the Handbook of Model Checking., 2018
Proceedings of the Security and Trust Management - 14th International Workshop, 2018
Proceedings of the LPAR-22. 22nd International Conference on Logic for Programming, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Concurrency, Security, and Puzzles, 2017
2016
Proceedings of the 18th International Symposium on Principles and Practice of Declarative Programming, 2016
2015
Log. Methods Comput. Sci., 2015
Proceedings of the Security Standardisation Research - Second International Conference, 2015
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later.
Proceedings of the Logic, Rewriting, and Concurrency, 2015
Proceedings of the Programming Languages with Applications to Biology and Security, 2015
2014
On Asymmetric Unification and the Combination Problem in Disjoint Theories (Extended Abstract).
Proceedings of the 28th International Workshop on Unification, 2014
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the Security Standardisation Research - First International Conference, 2014
Proceedings of the 16th International Symposium on Principles and Practice of Declarative Programming, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the Foundations of Software Science and Computation Structures, 2014
2013
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the Automated Deduction - CADE-24, 2013
2012
Proceedings of the 28th Conference on the Mathematical Foundations of Programming Semantics, 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the Distributed Computing and Internet Technology, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions
CoRR, 2011
Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis.
Proceedings of the 25th International Workshop on Unification, 2011
Proceedings of the 13th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2011
2010
Proceedings of the 26th Conference on the Mathematical Foundations of Programming Semantics, 2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
Proceedings of the Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 2010
Proceedings of the Computer Security, 2010
2009
ACM Trans. Inf. Syst. Secur., 2009
Proceedings of the Ninth Spanish Conference on Programming and Languages, 2009
CoRR, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
2008
Proceedings of the Computer Security, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements.
IEEE Trans. Dependable Secur. Comput., 2007
Proceedings of the Foundations of Security Analysis and Design V, 2007
2006
A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties.
Theor. Comput. Sci., 2006
Proceedings of the First International Workshop on Security and Rewriting Techniques, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the Computer Security, 2006
2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the 18th IEEE Computer Security Foundations Workshop, 2005
A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005
2004
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols.
Sci. Comput. Program., 2004
Formal specification and analysis of the Group Domain Of Interpretation Protocol using NPATRL and the NRL Protocol Analyzer.
J. Comput. Secur., 2004
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Computer Security, 2004
2003
IEEE J. Sel. Areas Commun., 2003
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis.
Proceedings of the Programming Languages and Systems, 2003
Proceedings of the 16th IEEE Computer Security Foundations Workshop (CSFW-16 2003), 30 June, 2003
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003
2002
Proceedings of the Practical Aspects of Declarative Languages, 4th International Symposium, 2002
Proceedings of the Software Security -- Theories and Systems, 2002
2001
J. Comput. Secur., 2001
Experiences in the Formal Analysis of the Group Domain of Interpretation Protocol (GDOI).
Proceedings of the Verlässliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen, 2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001
Proceedings of the CCS 2001, 2001
2000
Formal characterization and automated analysis of known-pair and chosen-text attacks.
IEEE J. Sel. Areas Commun., 2000
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000
Proceedings of the Computer Aided Verification, 12th International Conference, 2000
1999
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6).
IEEE Trans. Software Eng., 1999
Proceedings of the Fifteenth Conference on Mathematical Foundations of Progamming Semantics, 1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999
1998
Proceedings of the Financial Cryptography, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1997
Proceedings of the 1997 Workshop on New Security Paradigms, 1997
Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), 1997
1996
Guest Editorial: Introduction to the Special Section - Best Papers of the 1995 IEEE Symposium on Security and Privacy.
IEEE Trans. Software Eng., 1996
Des. Codes Cryptogr., 1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
Proceedings of the Computer Security, 1996
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996
1995
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Proceedings of the Proceedings on the 1992-1993 Workshop on New Security Paradigms, 1993
1992
J. Comput. Secur., 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Panel: Fundamental Questions about Formal Methods.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992
1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Discussion Summary.
Proceedings of the Database Security, 1991
Panel Discussion on the Polyinstantiation Problem: An Introduction.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Policies for Dynamic Upgrading.
Proceedings of the Database Security, 1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Constructing Containers Using a Multilevel Relational Data Model.
Proceedings of the Database Security, 1989
1988
Achieving a Trusted Database Management System Using Parallelism.
Proceedings of the Database Security, 1988
1987
IEEE Trans. Software Eng., 1987
The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert Channels.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987
Proceedings of the Third International Conference on Data Engineering, 1987
Integrity Versus Security in Multi-Level Secure Databases.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1986
A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986
1985
A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985
Proceedings of the Advances in Cryptology, 1985
1984