Name
Papers
Collaborators
CATHERINE MEADOWS
62
55
Citations 
PageRank 
Referers 
928
89.05
1272
Referees 
References 
635
839
Search Limit
1001000
Title
Citations
PageRank
Year
Predicting Asymptotic Behavior of Network Covert Channels: Experimental Results00.342022
CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms.00.342022
Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems10.392021
NExtSteP: An Extensible Testbed for Network Covert Channels00.342020
Protocol Analysis with Time00.342020
Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA.00.342018
Modular Verification of Sequential Composition for Private Channels in Maude-NPA.00.342018
Effective Sequential Protocol Composition in Maude-NPA.20.382016
Strand spaces with choice via a process algebra semantics.20.362016
Analysis of the PKCS#11 API Using the Maude-NPA Tool.10.342015
On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry.00.342015
A rewriting-based forwards semantics for Maude-NPA20.382014
On Asymmetric Unification and the Combination Problem in Disjoint Theories.00.342014
A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA.120.522014
Asymmetric unification: a new unification paradigm for cryptographic protocol analysis50.382013
Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions.90.672012
Special Issue on Security and Rewriting Foreword00.342012
Security and Trust Management - 7th International Workshop, STM 2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers161.052012
Formalizing Physical Security Procedures.20.402012
Security and Rewriting (Dagstuhl Seminar 11332).00.342011
Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions40.482011
Protocol analysis in Maude-NPA using unification modulo homomorphic encryption20.352011
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol70.462010
Reasoning about probabilistic security using task-PIOAs10.362010
Sequential protocol composition in maude-NPA50.412010
Protocol analysis modulo combination of theories: a case study in Maude-NPA60.412010
Deriving Ephemeral Authentication Using Channel Axioms.40.412009
State space reduction in the Maude-NRL Protocol Analyzer.110.532008
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties851.832007
Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop, ESAS 2007, Cambridge, UK, July 2-3, 2007, Proceedings161.872007
One Picture Is Worth a Dozen Connectives: A Fault-Tree Representation of NPATRL Security Requirements20.562007
Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer160.842007
Deriving secrecy in key establishment protocols160.652006
Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks100.782006
A rewriting-based inference system for the NRL Protocol analyzer and its meta-logical properties531.702006
On the Relative Soundness of the Free Algebra Model for Public Key Encryption110.532005
Preventing Wormhole Attacks On Wireless Ad Hoc Networks: A Graph Theoretic Approach512.612005
A rewriting-based inference system for the NRL protocol analyzer: grammar generation130.852005
An encapsulated authentication logic for reasoning about key distribution protocols271.022005
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols60.412004
Formal specification and analysis of the group domain of interpretation protocol using NPATRL and the NRL protocol analyzer231.132004
What makes a cryptographic protocol secure? the evolution of requirements specification in formal cryptographic protocol analysis70.532003
A procedure for verifying security against type confusion attacks150.692003
Relating cryptography and formal methods: a panel00.342003
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis00.342003
Environmental requirements for authentication protocols110.752002
Formalizing GDOI group key management requirements in NPATRL160.752001
The MFPS XV Security Session00.341999
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer834.641999
A formal framework and evaluation method for network denial of service8215.761999
  • 1
  • 2