Found 15 results
Filters: Author is Meadows, Catherine  [Clear All Filters]
2002
Canetti, R., C. Meadows, and P. Syverson, "Environmental Requirements for Authentication Protocols", International Symposium on Software Security, vol. Springer-Verlag LNCS 2609, pp. 339-355, 2002. PDF icon Canetti etal2002.pdf (186.26 KB)
Meadows, C., "Identifying Potential Type Confusion in Authenticated Messages", Workshop on Foundations of Computer Security, Copenhagen, Denmark, 2002. PDF icon Meadows2002b.pdf (125.64 KB)
Meadows, C., "Using a Declarative Language to Build an Experimental Analysis Tool", PADL '02, vol. Springer Verlag LNCS 2257, pp. 1-2, 2002. PDF icon Meadows2002.pdf (1.55 MB)
2001
Meadows, C., P. Syverson, and I. Cervesato, "Formalizing GDOI Group Key Management Requirements in NPATRL", 8th ACM Computer and Communications Security Conference - CCS'01: ACM Press, pp. 235-244, 2001. PDF icon Meadows etal2001.pdf (148.49 KB)
2000
Meadows, C., "A Cost-Based Framework for Analysis of Denial of Service in Networks", Journal of Computer Security, 2000. PDF icon Meadows2000.pdf (245.87 KB)
Syverson, P., C. Meadows, and I. Cervesato, "Dolev-Yao is no better than Machiavelli", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. PDF icon Syverson etal2000.pdf (169.38 KB)
Meadows, C., "Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives", First Workshop on Issues in the Theory of Security - WITS'00, Geneva, Switzerland, pp. 87-92, 2000. PDF icon Meadows2000b.pdf (21.31 KB)
Meadows, C., "Invariant Generation Techniques in Cryptographic Protocol Analysis", 13th Computer Security Foundations Workshop: IEEE Computer Society Press, 2000. PDF icon Meadows2000c.pdf (100.12 KB)
Meadows, C., "Open Issues in Formal Methods for Cryptographic Protocol Analysis", DISCEX 2000: IEEE Computer Society Press, pp. 237-250, 2000. PDF icon Meadows2000d.pdf (168.94 KB)