Παρακολούθηση
Catherine Meadows
Catherine Meadows
Head, Formal Methods Section, Naval Research Laboratory
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα nrl.navy.mil
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
The NRL protocol analyzer: An overview
C Meadows
The Journal of Logic Programming 26 (2), 113-131, 1996
7561996
Security of ramp schemes
GR Blakley, C Meadows
Advances in Cryptology, 242-268, 1985
5651985
Formal verification of cryptographic protocols: A survey
CA Meadows
International Conference on the Theory and Application of Cryptology, 133-150, 1994
3791994
Three systems for cryptographic protocol analysis
R Kemmerer, C Meadows, J Millen
Journal of CRYPTOLOGY 7 (2), 79-130, 1994
3541994
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows
IEEE journal on selected areas in communications 21 (1), 44-54, 2003
3262003
Maude-NPA: Cryptographic protocol analysis modulo equational properties
S Escobar, C Meadows, J Meseguer
Foundations of Security Analysis and Design V, 1-50, 2009
2892009
A formal framework and evaluation method for network denial of service
C Meadows
Proceedings of the 12th IEEE computer security foundations workshop, 4-13, 1999
2701999
Applying formal methods to the analysis of a key management protocol
CA Meadows
NAVAL RESEARCH LAB WASHINGTON DC, 1990
2691990
Applying formal methods to the analysis of a key management protocol
C Meadows
Journal of Computer Security 1 (1), 5-35, 1992
2621992
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
C Meadows
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
2281999
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005
2222005
A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party
C Meadows
IEEE Symposium on Security and Privacy, 134-137, 1986
2191986
A cost-based framework for analysis of denial of service in networks
C Meadows
Journal of Computer Security 9 (1-2), 143-164, 2001
1922001
Open issues in formal methods for cryptographic protocol analysis
C Meadows
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
1782000
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
CA Meadows
European Symposium on Research in Computer Security, 351-364, 1996
1761996
Fingerprinting long forgiving messages
GR Blakley, C Meadows, GB Purdy
Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986
1581986
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
S Escobar, C Meadows, J Meseguer
Theoretical Computer Science 367 (1-2), 162-202, 2006
1462006
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1312018
Model Checking Security Protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
1312018
A system for the specification and verification of key management protocols
C Meadows
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
1181991
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20