Catherine Meadows
Catherine Meadows
Head, Formal Methods Section, Naval Research Laboratory
Verified email at
Cited by
Cited by
The NRL protocol analyzer: An overview
C Meadows
The Journal of Logic Programming 26 (2), 113-131, 1996
Security of ramp schemes
GR Blakley, C Meadows
Advances in Cryptology, 242-268, 1985
Formal verification of cryptographic protocols: A survey
CA Meadows
International Conference on the Theory and Application of Cryptology, 133-150, 1994
Three systems for cryptographic protocol analysis
R Kemmerer, C Meadows, J Millen
Journal of CRYPTOLOGY 7 (2), 79-130, 1994
Formal methods for cryptographic protocol analysis: Emerging issues and trends
C Meadows
IEEE journal on selected areas in communications 21 (1), 44-54, 2003
Maude-NPA: Cryptographic protocol analysis modulo equational properties
S Escobar, C Meadows, J Meseguer
Foundations of Security Analysis and Design V, 1-50, 2009
A formal framework and evaluation method for network denial of service
C Meadows
Proceedings of the 12th IEEE computer security foundations workshop, 4-13, 1999
Applying formal methods to the analysis of a key management protocol
C Meadows
Journal of Computer Security 1 (1), 5-35, 1992
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang
IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer
C Meadows
Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999
A cost-based framework for analysis of denial of service in networks
C Meadows
Journal of Computer Security 9 (1-2), 143-164, 2001
Open issues in formal methods for cryptographic protocol analysis
C Meadows
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches
CA Meadows
European Symposium on Research in Computer Security, 351-364, 1996
A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party
C Meadows
IEEE Symposium on Security and Privacy, 134-137, 1986
Fingerprinting long forgiving messages
GR Blakley, C Meadows, GB Purdy
Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
S Escobar, C Meadows, J Meseguer
Theoretical Computer Science 367 (1-2), 162-202, 2006
Model checking security protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
Model Checking Security Protocols
D Basin, C Cremers, C Meadows
Handbook of Model Checking, 727-762, 2018
A system for the specification and verification of key management protocols
C Meadows
Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991
Distance bounding protocols: Authentication logic analysis and collusion attacks
C Meadows, R Poovendran, D Pavlovic, LW Chang, P Syverson
Secure localization and time synchronization for wireless sensor and ad hoc …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20