Search

Your search keyword '"Meadows, Catherine A."' showing total 504 results

Search Constraints

Start Over You searched for: Author "Meadows, Catherine A." Remove constraint Author: "Meadows, Catherine A."
504 results on '"Meadows, Catherine A."'

Search Results

1. A Logic of Sattestation

2. CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic Algorithms

5. Strand Spaces with Choice via a Process Algebra Semantics

6. Protocol Analysis with Time

7. On Asymmetric Unification for the Theory of XOR with a Homomorphism

8. Strand Spaces with Choice via a Process Algebra Semantics

11. Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA

12. Protocol Analysis with Time and Space

13. Moving the Bar on Computationally Sound Exclusive-Or

14. Algorithmic Problems in the Symbolic Approach to the Verification of Automatically Synthesized Cryptosystems

15. Effective Sequential Protocol Composition in Maude-NPA

17. On Unification Modulo One-Sided Distributivity: Algorithms, Variants and Asymmetry

18. Modular Verification of Sequential Composition for Private Channels in Maude-NPA

23. Actor-network procedures: Modeling multi-factor authentication, device pairing, social interactions

24. State Space Reduction in the Maude-NRL Protocol Analyzer

25. Quantifying pervasive authentication: the case of the Hancke-Kuhn protocol

26. Protocol Analysis with Time

27. Stealthy Protocols: Metrics and Open Problems

29. Analysis of the PKCS#11 API Using the Maude-NPA Tool

30. Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories

31. Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later

33. On Asymmetric Unification and the Combination Problem in Disjoint Theories

34. Analysis of the IBM CCA Security API Protocols in Maude-NPA

35. A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA

37. Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

38. Formalizing Physical Security Procedures

39. Deriving Ephemeral Authentication Using Channel Axioms

40. Deriving Ephemeral Authentication Using Channel Axioms : (Transcript of Discussion)

41. Effective Symbolic Protocol Analysis via Equational Irreducibility Conditions

42. Actor-Network Procedures : (Extended Abstract)

43. Protocol Analysis Modulo Combination of Theories: A Case Study in Maude-NPA

46. Reasoning about Probabilistic Security Using Task-PIOAs

47. Sequential Protocol Composition in Maude-NPA

48. Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties

49. State Space Reduction in the Maude-NRL Protocol Analyzer

Catalog

Books, media, physical & digital resources