Found 15 results
Filters: Author is Meadows, Catherine  [Clear All Filters]
2002
Canetti, R., C. Meadows, and P. Syverson, "Environmental Requirements for Authentication Protocols", International Symposium on Software Security, vol. Springer-Verlag LNCS 2609, pp. 339-355, 2002. Canetti etal2002.pdf (186.26 KB)
Meadows, C., "Identifying Potential Type Confusion in Authenticated Messages", Workshop on Foundations of Computer Security, Copenhagen, Denmark, 2002. Meadows2002b.pdf (125.64 KB)
Meadows, C., "Using a Declarative Language to Build an Experimental Analysis Tool", PADL '02, vol. Springer Verlag LNCS 2257, pp. 1-2, 2002. Meadows2002.pdf (1.55 MB)
2001
Meadows, C., P. Syverson, and I. Cervesato, "Formalizing GDOI Group Key Management Requirements in NPATRL", 8th ACM Computer and Communications Security Conference - CCS'01: ACM Press, pp. 235-244, 2001. Meadows etal2001.pdf (148.49 KB)
2000
Meadows, C., "A Cost-Based Framework for Analysis of Denial of Service in Networks", Journal of Computer Security, 2000. Meadows2000.pdf (245.87 KB)
Syverson, P., C. Meadows, and I. Cervesato, "Dolev-Yao is no better than Machiavelli", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. Syverson etal2000.pdf (169.38 KB)
Meadows, C., "Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. Meadows2000b.pdf (21.31 KB)
Meadows, C., "Invariant Generation Techniques in Cryptographic Protocol Analysis", 13th Computer Security Foundations Workshop: IEEE Computer Society Press, 2000. Meadows2000c.pdf (100.12 KB)
Meadows, C., "Open Issues in Formal Methods for Cryptographic Protocol Analysis", DISCEX 2000: IEEE Computer Society Press, pp. 237-250, 2000. Meadows2000d.pdf (168.94 KB)