Catherine Meadows

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
CryptoSolve: towards a tool for the symbolic analysis of cryptographic algorithms
(available as arXiv preprint)
2024-02-08Paper
CryptoSolve: towards a tool for the symbolic analysis of cryptographic algorithms2024-02-08Paper
Protocol analysis with time and space2022-07-13Paper
Protocol analysis with time
(available as arXiv preprint)
2022-07-06Paper
Moving the bar on computationally sound exclusive-or2022-06-24Paper
Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems2022-03-24Paper
On asymmetric unification for the theory of XOR with a homomorphism
(available as arXiv preprint)
2020-05-13Paper
Model Checking Security Protocols
Handbook of Model Checking
2018-07-20Paper
Stealthy protocols: metrics and open problems2018-03-26Paper
Security of Ramp Schemes
Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984)
2017-04-10Paper
Bayesian authentication: quantifying security of the Hancke-Kuhn protocol
Electronic Notes in Theoretical Computer Science
2016-07-08Paper
Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories
Programming Languages with Applications to Biology and Security
2016-01-08Paper
Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later
Lecture Notes in Computer Science
2015-09-14Paper
On unification modulo one-sided distributivity: algorithms, variants and asymmetry
Logical Methods in Computer Science
2015-08-25Paper
State space reduction in the Maude-NRL protocol analyzer
Information and Computation
2014-10-20Paper
On Asymmetric Unification and the Combination Problem in Disjoint Theories
Lecture Notes in Computer Science
2014-04-16Paper
On the relative soundness of the free algebra model for public key encryption2013-09-25Paper
Asymmetric unification: a new unification paradigm for cryptographic protocol analysis
Automated Deduction – CADE-24
2013-06-14Paper
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
Foundations of Security Analysis and Design V
2009-10-22Paper
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
Theoretical Computer Science
2007-01-09Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols
Science of Computer Programming
2004-11-22Paper
scientific article; zbMATH DE number 1962757 (Why is no real title available?)2003-08-11Paper
scientific article; zbMATH DE number 1956542 (Why is no real title available?)2003-07-30Paper
scientific article; zbMATH DE number 1739881 (Why is no real title available?)2002-05-13Paper
scientific article; zbMATH DE number 1113949 (Why is no real title available?)1998-06-11Paper
scientific article; zbMATH DE number 1088926 (Why is no real title available?)1997-11-18Paper
scientific article; zbMATH DE number 1024091 (Why is no real title available?)1997-10-20Paper
The NRL Protocol Analyzer: An Overview
The Journal of Logic Programming
1997-04-17Paper
A formal language for cryptographic protocol requirements
Designs, Codes and Cryptography
1996-08-19Paper
Three systems for cryptographic protocol analysis
Journal of Cryptology
1994-08-17Paper
Summing over a network without revealing summands
BIT
1989-01-01Paper
scientific article; zbMATH DE number 3972788 (Why is no real title available?)1985-01-01Paper
Linear systems cut out by quadric on projections of varieties
Journal of Algebra
1984-01-01Paper


Research outcomes over time


This page was built for person: Catherine Meadows