BibTeX records: Catherine Meadows 0001

download as .bib file

@inproceedings{DBLP:conf/birthday/Yang0MMS23,
  author       = {Fan Yang and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Sonia Santiago},
  editor       = {Pedro L{\'{o}}pez{-}Garc{\'{\i}}a and
                  John P. Gallagher and
                  Roberto Giacobazzi},
  title        = {Strand Spaces with Choice via a Process Algebra Semantics},
  booktitle    = {Analysis, Verification and Transformation for Declarative Programming
                  and Intelligent Systems - Essays Dedicated to Manuel Hermenegildo
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {13160},
  pages        = {307--350},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31476-6\_17},
  doi          = {10.1007/978-3-031-31476-6\_17},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Yang0MMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GalanGEMM23,
  author       = {D. Gal{\'{a}}n and
                  V{\'{\i}}ctor Garc{\'{\i}}a and
                  Santiago Escobar and
                  Catherine A. Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Protocol Dialects as Formal Patterns},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14345},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51476-0\_3},
  doi          = {10.1007/978-3-031-51476-0\_3},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/GalanGEMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Meadows22,
  author       = {Catherine Meadows},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Predicting Asymptotic Behavior of Network Covert Channels: Experimental
                  Results},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {2--3},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3516669},
  doi          = {10.1145/3508398.3516669},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/Meadows22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-2209-10321,
  author       = {Dalton Chichester and
                  Wei Du and
                  Raymond Kauffman and
                  Hai Lin and
                  Christopher Lynch and
                  Andrew M. Marshall and
                  Catherine A. Meadows and
                  Paliath Narendran and
                  Veena Ravishankar and
                  Luis Rovira and
                  Brandon Rozek},
  editor       = {Pierre Ganty and
                  Dario Della Monica},
  title        = {CryptoSolve: Towards a Tool for the Symbolic Analysis of Cryptographic
                  Algorithms},
  booktitle    = {Proceedings of the 13th International Symposium on Games, Automata,
                  Logics and Formal Verification, GandALF 2022, Madrid, Spain, September
                  21-23, 2022},
  series       = {{EPTCS}},
  volume       = {370},
  pages        = {147--161},
  year         = {2022},
  url          = {https://doi.org/10.4204/EPTCS.370.10},
  doi          = {10.4204/EPTCS.370.10},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-10321.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Aparicio-Sanchez21,
  author       = {Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Julia Sapi{\~{n}}a},
  editor       = {Daniel Dougherty and
                  Jos{\'{e}} Meseguer and
                  Sebastian Alexander M{\"{o}}dersheim and
                  Paul D. Rowe},
  title        = {Protocol Analysis with Time and Space},
  booktitle    = {Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman
                  on the Occasion of his 66.66th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {13066},
  pages        = {22--49},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-91631-2\_2},
  doi          = {10.1007/978-3-030-91631-2\_2},
  timestamp    = {Thu, 21 Sep 2023 09:08:34 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Aparicio-Sanchez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Meadows21,
  author       = {Catherine Meadows},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Moving the Bar on Computationally Sound Exclusive-Or},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12973},
  pages        = {275--295},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_14},
  doi          = {10.1007/978-3-030-88428-4\_14},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Meadows21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/LinLMMNRR21,
  author       = {Hai Lin and
                  Christopher Lynch and
                  Andrew M. Marshall and
                  Catherine A. Meadows and
                  Paliath Narendran and
                  Veena Ravishankar and
                  Brandon Rozek},
  editor       = {Boris Konev and
                  Giles Reger},
  title        = {Algorithmic Problems in the Symbolic Approach to the Verification
                  of Automatically Synthesized Cryptosystems},
  booktitle    = {Frontiers of Combining Systems - 13th International Symposium, FroCoS
                  2021, Birmingham, UK, September 8-10, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12941},
  pages        = {253--270},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-86205-3\_14},
  doi          = {10.1007/978-3-030-86205-3\_14},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/LinLMMNRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ChenJMS20,
  author       = {Olga Chen and
                  Aaron D. Jaggard and
                  Catherine Meadows and
                  Michael C. Shlanta},
  title        = {NExtSteP: An Extensible Testbed for Network Covert Channels},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162247},
  doi          = {10.1109/CNS48642.2020.9162247},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/ChenJMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Aparicio-Sanchez20,
  author       = {Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Julia Sapi{\~{n}}a},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Protocol Analysis with Time},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {128--150},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_7},
  doi          = {10.1007/978-3-030-65277-7\_7},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Aparicio-Sanchez20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/unif/MarshallMNRR20,
  author       = {Andrew M. Marshall and
                  Catherine Meadows and
                  Paliath Narendran and
                  Veena Ravishankar and
                  Brandon Rozek},
  editor       = {Temur Kutsia and
                  Andrew M. Marshall},
  title        = {Algorithmic Problems in Synthesized Cryptosystems (Extended Abstract)},
  booktitle    = {Proceedings of the 34th International Workshop on Unification, {UNIF}
                  2020, Linz, Austria, June 29, 2020},
  pages        = {10:1--10:6},
  year         = {2020},
  url          = {http://www3.risc.jku.at/publications/download/risc\_6129/proceedings-UNIF2020.pdf\#page=58},
  timestamp    = {Wed, 20 Sep 2023 10:23:47 +0200},
  biburl       = {https://dblp.org/rec/conf/unif/MarshallMNRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-13707,
  author       = {Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Julia Sapi{\~{n}}a},
  title        = {Protocol Analysis with Time},
  journal      = {CoRR},
  volume       = {abs/2010.13707},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.13707},
  eprinttype    = {arXiv},
  eprint       = {2010.13707},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-13707.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Meadows20,
  author       = {Catherine Meadows},
  title        = {Symbolic and Computational Reasoning About Cryptographic Modes of
                  Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/794},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Meadows20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/frocos/LynchMMNR19,
  author       = {Christopher Lynch and
                  Andrew M. Marshall and
                  Catherine Meadows and
                  Paliath Narendran and
                  Veena Ravishankar},
  editor       = {Andreas Herzig and
                  Andrei Popescu},
  title        = {On Asymmetric Unification for the Theory of {XOR} with a Homomorphism},
  booktitle    = {Frontiers of Combining Systems - 12th International Symposium, FroCoS
                  2019, London, UK, September 4-6, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11715},
  pages        = {297--312},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29007-8\_17},
  doi          = {10.1007/978-3-030-29007-8\_17},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/frocos/LynchMMNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-09946,
  author       = {Fan Yang and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  title        = {Strand Spaces with Choice via a Process Algebra Semantics},
  journal      = {CoRR},
  volume       = {abs/1904.09946},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.09946},
  eprinttype    = {arXiv},
  eprint       = {1904.09946},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-09946.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-00227,
  author       = {Christopher Lynch and
                  Andrew M. Marshall and
                  Catherine Meadows and
                  Paliath Narendran and
                  Veena Ravishankar},
  title        = {On Asymmetric Unification for the Theory of {XOR} with a Homomorphism},
  journal      = {CoRR},
  volume       = {abs/1907.00227},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.00227},
  eprinttype    = {arXiv},
  eprint       = {1907.00227},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-00227.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lpar/Gonzalez-Burgueno18,
  author       = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and
                  Dami{\'{a}}n Aparicio{-}S{\'{a}}nchez and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Gilles Barthe and
                  Geoff Sutcliffe and
                  Margus Veanes},
  title        = {Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA},
  booktitle    = {{LPAR-22.} 22nd International Conference on Logic for Programming,
                  Artificial Intelligence and Reasoning, Awassa, Ethiopia, 16-21 November
                  2018},
  series       = {EPiC Series in Computing},
  volume       = {57},
  pages        = {400--417},
  publisher    = {EasyChair},
  year         = {2018},
  url          = {https://doi.org/10.29007/c4xk},
  doi          = {10.29007/C4XK},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lpar/Gonzalez-Burgueno18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/YangEMM18,
  author       = {Fan Yang and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Sokratis K. Katsikas and
                  Cristina Alcaraz},
  title        = {Modular Verification of Sequential Composition for Private Channels
                  in Maude-NPA},
  booktitle    = {Security and Trust Management - 14th International Workshop, {STM}
                  2018, Barcelona, Spain, September 6-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11091},
  pages        = {20--36},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01141-3\_2},
  doi          = {10.1007/978-3-030-01141-3\_2},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/YangEMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/mc/BasinCM18,
  author       = {David A. Basin and
                  Cas Cremers and
                  Catherine Meadows},
  editor       = {Edmund M. Clarke and
                  Thomas A. Henzinger and
                  Helmut Veith and
                  Roderick Bloem},
  title        = {Model Checking Security Protocols},
  booktitle    = {Handbook of Model Checking},
  pages        = {727--762},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-10575-8\_22},
  doi          = {10.1007/978-3-319-10575-8\_22},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/mc/BasinCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-07209,
  author       = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and
                  Dami{\'{a}}n Aparicio and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  title        = {Formal verification of the YubiKey and YubiHSM APIs in Maude-NPA},
  journal      = {CoRR},
  volume       = {abs/1806.07209},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.07209},
  eprinttype    = {arXiv},
  eprint       = {1806.07209},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-07209.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/ChenMT17,
  author       = {Olga Chen and
                  Catherine Meadows and
                  Gautam Trivedi},
  editor       = {Thomas Gibson{-}Robinson and
                  Philippa J. Hopcroft and
                  Ranko Lazic},
  title        = {Stealthy Protocols: Metrics and Open Problems},
  booktitle    = {Concurrency, Security, and Puzzles - Essays Dedicated to Andrew William
                  Roscoe on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {10160},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-51046-0\_1},
  doi          = {10.1007/978-3-319-51046-0\_1},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/ChenMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Meadows17,
  author       = {Catherine Meadows},
  title        = {Symbolic Security Criteria for Blockwise Adaptive Secure Modes of
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1152},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1152},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Meadows17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppdp/YangEMMS16,
  author       = {Fan Yang and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Sonia Santiago},
  editor       = {James Cheney and
                  Germ{\'{a}}n Vidal},
  title        = {Strand spaces with choice via a process algebra semantics},
  booktitle    = {Proceedings of the 18th International Symposium on Principles and
                  Practice of Declarative Programming, Edinburgh, United Kingdom, September
                  5-7, 2016},
  pages        = {76--89},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2967973.2968609},
  doi          = {10.1145/2967973.2968609},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ppdp/YangEMMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-1,
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9878},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45744-4},
  doi          = {10.1007/978-3-319-45744-4},
  isbn         = {978-3-319-45743-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2016-2,
  editor       = {Ioannis G. Askoxylakis and
                  Sotiris Ioannidis and
                  Sokratis K. Katsikas and
                  Catherine Meadows},
  title        = {Computer Security - {ESORICS} 2016 - 21st European Symposium on Research
                  in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9879},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45741-3},
  doi          = {10.1007/978-3-319-45741-3},
  isbn         = {978-3-319-45740-6},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/SantiagoEMM16,
  author       = {Sonia Santiago and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  title        = {Effective Sequential Protocol Composition in Maude-NPA},
  journal      = {CoRR},
  volume       = {abs/1603.00087},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.00087},
  eprinttype    = {arXiv},
  eprint       = {1603.00087},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/SantiagoEMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/MarshallMN15,
  author       = {Andrew M. Marshall and
                  Catherine Meadows and
                  Paliath Narendran},
  title        = {On Unification Modulo One-Sided Distributivity: Algorithms, Variants
                  and Asymmetry},
  journal      = {Log. Methods Comput. Sci.},
  volume       = {11},
  number       = {2},
  year         = {2015},
  url          = {https://doi.org/10.2168/LMCS-11(2:11)2015},
  doi          = {10.2168/LMCS-11(2:11)2015},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/MarshallMN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/EscobarMMS15,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Sonia Santiago},
  editor       = {Chiara Bodei and
                  Gian{-}Luigi Ferrari and
                  Corrado Priami},
  title        = {Symbolic Protocol Analysis with Disequality Constraints Modulo Equational
                  Theories},
  booktitle    = {Programming Languages with Applications to Biology and Security -
                  Essays Dedicated to Pierpaolo Degano on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9465},
  pages        = {238--261},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25527-9\_16},
  doi          = {10.1007/978-3-319-25527-9\_16},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/EscobarMMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/Meadows15,
  author       = {Catherine Meadows},
  editor       = {Narciso Mart{\'{\i}}{-}Oliet and
                  Peter Csaba {\"{O}}lveczky and
                  Carolyn L. Talcott},
  title        = {Emerging Issues and Trends in Formal Methods in Cryptographic Protocol
                  Analysis: Twelve Years Later},
  booktitle    = {Logic, Rewriting, and Concurrency - Essays dedicated to Jos{\'{e}}
                  Meseguer on the Occasion of His 65th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {9200},
  pages        = {475--492},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-23165-5\_22},
  doi          = {10.1007/978-3-319-23165-5\_22},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/Meadows15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Gonzalez-Burgueno15,
  author       = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and
                  Sonia Santiago and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Liqun Chen and
                  Shin'ichiro Matsuo},
  title        = {Analysis of the PKCS{\#}11 {API} Using the Maude-NPA Tool},
  booktitle    = {Security Standardisation Research - Second International Conference,
                  {SSR} 2015, Tokyo, Japan, December 15-16, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9497},
  pages        = {86--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27152-1\_5},
  doi          = {10.1007/978-3-319-27152-1\_5},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Gonzalez-Burgueno15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/EscobarMMS14,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Sonia Santiago},
  title        = {State space reduction in the Maude-NRL Protocol Analyzer},
  journal      = {Inf. Comput.},
  volume       = {238},
  pages        = {157--186},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ic.2014.07.007},
  doi          = {10.1016/J.IC.2014.07.007},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/EscobarMMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fossacs/ErbaturKMMNR14,
  author       = {Serdar Erbatur and
                  Deepak Kapur and
                  Andrew M. Marshall and
                  Catherine Meadows and
                  Paliath Narendran and
                  Christophe Ringeissen},
  editor       = {Anca Muscholl},
  title        = {On Asymmetric Unification and the Combination Problem in Disjoint
                  Theories},
  booktitle    = {Foundations of Software Science and Computation Structures - 17th
                  International Conference, {FOSSACS} 2014, Held as Part of the European
                  Joint Conferences on Theory and Practice of Software, {ETAPS} 2014,
                  Grenoble, France, April 5-13, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8412},
  pages        = {274--288},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54830-7\_18},
  doi          = {10.1007/978-3-642-54830-7\_18},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fossacs/ErbaturKMMNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/EscobarMMS14,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Sonia Santiago},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {A rewriting-based forwards semantics for Maude-NPA},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {3},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600186},
  doi          = {10.1145/2600176.2600186},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hotsos/EscobarMMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppdp/YangEMMN14,
  author       = {Fan Yang and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Paliath Narendran},
  editor       = {Olaf Chitil and
                  Andy King and
                  Olivier Danvy},
  title        = {Theories of Homomorphic Encryption, Unification, and the Finite Variant
                  Property},
  booktitle    = {Proceedings of the 16th International Symposium on Principles and
                  Practice of Declarative Programming, Kent, Canterbury, United Kingdom,
                  September 8-10, 2014},
  pages        = {123--133},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2643135.2643154},
  doi          = {10.1145/2643135.2643154},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ppdp/YangEMMN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Gonzalez-Burgueno14,
  author       = {Antonio Gonz{\'{a}}lez{-}Burgue{\~{n}}o and
                  Sonia Santiago and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Liqun Chen and
                  Chris J. Mitchell},
  title        = {Analysis of the {IBM} {CCA} Security {API} Protocols in Maude-NPA},
  booktitle    = {Security Standardisation Research - First International Conference,
                  {SSR} 2014, London, UK, December 16-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8893},
  pages        = {111--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-14054-4\_8},
  doi          = {10.1007/978-3-319-14054-4\_8},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Gonzalez-Burgueno14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SantiagoEMM14,
  author       = {Sonia Santiago and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Sjouke Mauw and
                  Christian Damsgaard Jensen},
  title        = {A Formal Definition of Protocol Indistinguishability and Its Verification
                  Using Maude-NPA},
  booktitle    = {Security and Trust Management - 10th International Workshop, {STM}
                  2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8743},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11851-2\_11},
  doi          = {10.1007/978-3-319-11851-2\_11},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SantiagoEMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/unif/ErbaturKMMNR14,
  author       = {Serdar Erbatur and
                  Deepak Kapur and
                  Andrew M. Marshall and
                  Catherine Meadows and
                  Paliath Narendran and
                  Christophe Ringeissen},
  editor       = {Temur Kutsia and
                  Christophe Ringeissen},
  title        = {On Asymmetric Unification and the Combination Problem in Disjoint
                  Theories (Extended Abstract)},
  booktitle    = {Proceedings of the 28th International Workshop on Unification, {UNIF}
                  2014, Vienna, Austria, July 13, 2014},
  pages        = {33--35},
  year         = {2014},
  url          = {https://www3.risc.jku.at/publications/download/risc\_5001/proceedings-UNIF2014.pdf\#page=38},
  timestamp    = {Tue, 19 Sep 2023 15:35:06 +0200},
  biburl       = {https://dblp.org/rec/conf/unif/ErbaturKMMNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/ErbaturEKLLMMNSS13,
  author       = {Serdar Erbatur and
                  Santiago Escobar and
                  Deepak Kapur and
                  Zhiqiang Liu and
                  Christopher Lynch and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Paliath Narendran and
                  Sonia Santiago and
                  Ralf Sasse},
  editor       = {Maria Paola Bonacina},
  title        = {Asymmetric Unification: {A} New Unification Paradigm for Cryptographic
                  Protocol Analysis},
  booktitle    = {Automated Deduction - {CADE-24} - 24th International Conference on
                  Automated Deduction, Lake Placid, NY, USA, June 9-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7898},
  pages        = {231--248},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38574-2\_16},
  doi          = {10.1007/978-3-642-38574-2\_16},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cade/ErbaturEKLLMMNSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/Comon-LundhM12,
  author       = {Hubert Comon{-}Lundh and
                  Catherine Meadows},
  title        = {Special Issue on Security and Rewriting Foreword},
  journal      = {J. Autom. Reason.},
  volume       = {48},
  number       = {2},
  pages        = {133--134},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10817-011-9242-1},
  doi          = {10.1007/S10817-011-9242-1},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/Comon-LundhM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ErbaturEKLLMMNSS12,
  author       = {Serdar Erbatur and
                  Santiago Escobar and
                  Deepak Kapur and
                  Zhiqiang Liu and
                  Christopher Lynch and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Paliath Narendran and
                  Sonia Santiago and
                  Ralf Sasse},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {Effective Symbolic Protocol Analysis via Equational Irreducibility
                  Conditions},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_5},
  doi          = {10.1007/978-3-642-33167-1\_5},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ErbaturEKLLMMNSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/PavlovicM12,
  author       = {Dusko Pavlovic and
                  Catherine Meadows},
  editor       = {Ramaswamy Ramanujam and
                  Srini Ramaswamy},
  title        = {Actor-Network Procedures - (Extended Abstract)},
  booktitle    = {Distributed Computing and Internet Technology - 8th International
                  Conference, {ICDCIT} 2012, Bhubaneswar, India, February 2-4, 2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7154},
  pages        = {7--26},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-28073-3\_2},
  doi          = {10.1007/978-3-642-28073-3\_2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/PavlovicM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/MeadowsP12,
  author       = {Catherine Meadows and
                  Dusko Pavlovic},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Formalizing Physical Security Procedures},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_13},
  doi          = {10.1007/978-3-642-38004-4\_13},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/MeadowsP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/BrookesJMMP12,
  author       = {Stephen D. Brookes and
                  Achim Jung and
                  Catherine Meadows and
                  Michael W. Mislove and
                  Prakash Panangaden},
  editor       = {Ulrich Berger and
                  Michael W. Mislove},
  title        = {Dedication},
  booktitle    = {Proceedings of the 28th Conference on the Mathematical Foundations
                  of Programming Semantics, {MFPS} 2012, Bath, UK, June 6-9, 2012},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {286},
  pages        = {3},
  publisher    = {Elsevier},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.entcs.2012.08.022},
  doi          = {10.1016/J.ENTCS.2012.08.022},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/BrookesJMMP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2011,
  editor       = {Catherine Meadows and
                  M. Carmen Fern{\'{a}}ndez Gago},
  title        = {Security and Trust Management - 7th International Workshop, {STM}
                  2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7170},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29963-6},
  doi          = {10.1007/978-3-642-29963-6},
  isbn         = {978-3-642-29962-9},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ppdp/EscobarKLMMNS11,
  author       = {Santiago Escobar and
                  Deepak Kapur and
                  Christopher Lynch and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Paliath Narendran and
                  Ralf Sasse},
  editor       = {Peter Schneider{-}Kamp and
                  Michael Hanus},
  title        = {Protocol analysis in Maude-NPA using unification modulo homomorphic
                  encryption},
  booktitle    = {Proceedings of the 13th International {ACM} {SIGPLAN} Conference on
                  Principles and Practice of Declarative Programming, July 20-22, 2011,
                  Odense, Denmark},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2003476.2003488},
  doi          = {10.1145/2003476.2003488},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ppdp/EscobarKLMMNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/unif/ErbaturEKLLMMNS11,
  author       = {Serdar Erbatur and
                  Santiago Escobar and
                  Deepak Kapur and
                  Zhiqiang Liu and
                  Christopher Lynch and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Paliath Narendran and
                  Ralf Sasse},
  editor       = {Franz Baader and
                  Barbara Morawska and
                  Jan Otop},
  title        = {Asymmetric Unification: {A} New Unification Paradigm for Cryptographic
                  Protocol Analysis},
  booktitle    = {Proceedings of the 25th International Workshop on Unification, {UNIF}
                  2011, Wroclaw, Poland, July 31, 2011},
  pages        = {59--64},
  year         = {2011},
  url          = {https://www.irif.fr/\%7Etreinen/unif/past/unif11/unif11-proceedings.pdf\#page=65},
  timestamp    = {Mon, 23 Oct 2023 15:28:12 +0200},
  biburl       = {https://dblp.org/rec/conf/unif/ErbaturEKLLMMNS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Meadows11,
  author       = {Catherine Meadows},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Applications of Formal Methods to Intrusion Detection},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {44--45},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_855},
  doi          = {10.1007/978-1-4419-5906-5\_855},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Meadows11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Meadows11a,
  author       = {Catherine Meadows},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Formal Analysis of Cryptographic Protocols},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {490--492},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_876},
  doi          = {10.1007/978-1-4419-5906-5\_876},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Meadows11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Meadows11b,
  author       = {Catherine Meadows},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Formal Methods in Certification and Evaluation},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {498--499},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_858},
  doi          = {10.1007/978-1-4419-5906-5\_858},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Meadows11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Meadows11c,
  author       = {Catherine Meadows},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Program Verification and Security},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {981--983},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_863},
  doi          = {10.1007/978-1-4419-5906-5\_863},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Meadows11c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Meadows11d,
  author       = {Catherine Meadows},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Theorem Proving and Security},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1285--1287},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_869},
  doi          = {10.1007/978-1-4419-5906-5\_869},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Meadows11d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Meadows11e,
  author       = {Catherine Meadows},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Type Checking and Security},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1342--1343},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_867},
  doi          = {10.1007/978-1-4419-5906-5\_867},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Meadows11e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-5282,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  title        = {State Space Reduction in the Maude-NRL Protocol Analyzer},
  journal      = {CoRR},
  volume       = {abs/1105.5282},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.5282},
  eprinttype    = {arXiv},
  eprint       = {1105.5282},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-5282.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-0706,
  author       = {Dusko Pavlovic and
                  Catherine Meadows},
  title        = {Actor-network procedures: Modeling multi-factor authentication, device
                  pairing, social interactions},
  journal      = {CoRR},
  volume       = {abs/1106.0706},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.0706},
  eprinttype    = {arXiv},
  eprint       = {1106.0706},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-0706.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/Comon-LundhKM11,
  author       = {Hubert Comon{-}Lundh and
                  Ralf K{\"{u}}sters and
                  Catherine Meadows},
  title        = {Security and Rewriting (Dagstuhl Seminar 11332)},
  journal      = {Dagstuhl Reports},
  volume       = {1},
  number       = {8},
  pages        = {53--66},
  year         = {2011},
  url          = {https://doi.org/10.4230/DagRep.1.8.53},
  doi          = {10.4230/DAGREP.1.8.53},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/Comon-LundhKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EscobarMMS10,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer and
                  Sonia Santiago},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Sequential Protocol Composition in Maude-NPA},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {303--318},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_19},
  doi          = {10.1007/978-3-642-15497-3\_19},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/EscobarMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/JaggardMMS10,
  author       = {Aaron D. Jaggard and
                  Catherine Meadows and
                  Michael W. Mislove and
                  Roberto Segala},
  editor       = {Alessandro Armando and
                  Gavin Lowe},
  title        = {Reasoning about Probabilistic Security Using Task-PIOAs},
  booktitle    = {Automated Reasoning for Security Protocol Analysis and Issues in the
                  Theory of Security - Joint Workshop, {ARSPA-WITS} 2010, Paphos, Cyprus,
                  March 27-28, 2010. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6186},
  pages        = {2--22},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16074-5\_2},
  doi          = {10.1007/978-3-642-16074-5\_2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/JaggardMMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/SasseEMM10,
  author       = {Ralf Sasse and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Jorge Cu{\'{e}}llar and
                  Gilles Barthe and
                  Alexander Pretschner},
  title        = {Protocol Analysis Modulo Combination of Theories: {A} Case Study in
                  Maude-NPA},
  booktitle    = {Security and Trust Management - 6th International Workshop, {STM}
                  2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6710},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22444-7\_11},
  doi          = {10.1007/978-3-642-22444-7\_11},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/SasseEMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/PavlovicM10,
  author       = {Dusko Pavlovic and
                  Catherine Meadows},
  editor       = {Michael W. Mislove and
                  Peter Selinger},
  title        = {Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol},
  booktitle    = {Proceedings of the 26th Conference on the Mathematical Foundations
                  of Programming Semantics, {MFPS} 2010, Ottawa, Ontario, Canada, May
                  6-10, 2010},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {265},
  pages        = {97--122},
  publisher    = {Elsevier},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.entcs.2010.08.007},
  doi          = {10.1016/J.ENTCS.2010.08.007},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/PavlovicM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Meadows09,
  author       = {Catherine Meadows},
  title        = {Introduction to {ACM} {TISSEC} special issue on {CCS} 2005},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {1:1--1:2},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609957},
  doi          = {10.1145/1609956.1609957},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Meadows09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/PavlovicM09,
  author       = {Dusko Pavlovic and
                  Catherine Meadows},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Deriving Ephemeral Authentication Using Channel Axioms},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {240--261},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_27},
  doi          = {10.1007/978-3-642-36213-2\_27},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/PavlovicM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Meadows09,
  author       = {Catherine Meadows},
  editor       = {Bruce Christianson and
                  James A. Malcolm and
                  Vashek Matyas and
                  Michael Roe},
  title        = {Deriving Ephemeral Authentication Using Channel Axioms},
  booktitle    = {Security Protocols XVII, 17th International Workshop, Cambridge, UK,
                  April 1-3, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7028},
  pages        = {262--268},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-36213-2\_28},
  doi          = {10.1007/978-3-642-36213-2\_28},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Meadows09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/SantiagoTEMM09,
  author       = {Sonia Santiago and
                  Carolyn L. Talcott and
                  Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Paqui Lucio and
                  Gin{\'{e}}s Moreno and
                  Ricardo Pe{\~{n}}a},
  title        = {A Graphical User Interface for Maude-NPA},
  booktitle    = {Proceedings of the Ninth Spanish Conference on Programming and Languages,
                  {PROLE} 2009, San Sebasti{\'{a}}n, Spain, September 9-11, 2009},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {258},
  number       = {1},
  pages        = {3--20},
  publisher    = {Elsevier},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.entcs.2009.12.002},
  doi          = {10.1016/J.ENTCS.2009.12.002},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/SantiagoTEMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/PavlovicM09,
  author       = {Dusko Pavlovic and
                  Catherine Meadows},
  title        = {Quantifying pervasive authentication: the case of the Hancke-Kuhn
                  protocol},
  journal      = {CoRR},
  volume       = {abs/0910.5745},
  year         = {2009},
  url          = {http://arxiv.org/abs/0910.5745},
  eprinttype    = {arXiv},
  eprint       = {0910.5745},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/PavlovicM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EscobarMM08,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {State Space Reduction in the Maude-NRL Protocol Analyzer},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {548--562},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_35},
  doi          = {10.1007/978-3-540-88313-5\_35},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/EscobarMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CervesatoM07,
  author       = {Iliano Cervesato and
                  Catherine Meadows},
  title        = {One Picture Is Worth a Dozen Connectives: {A} Fault-Tree Representation
                  of {NPATRL} Security Requirements},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {4},
  number       = {3},
  pages        = {216--227},
  year         = {2007},
  url          = {https://doi.org/10.1109/TDSC.2007.70206},
  doi          = {10.1109/TDSC.2007.70206},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CervesatoM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/EscobarMM07,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Alessandro Aldini and
                  Gilles Barthe and
                  Roberto Gorrieri},
  title        = {Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties},
  booktitle    = {Foundations of Security Analysis and Design V, {FOSAD} 2007/2008/2009
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {5705},
  pages        = {1--50},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-03829-7\_1},
  doi          = {10.1007/978-3-642-03829-7\_1},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/EscobarMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MeadowsPPCS07,
  author       = {Catherine Meadows and
                  Radha Poovendran and
                  Dusko Pavlovic and
                  LiWu Chang and
                  Paul F. Syverson},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Distance Bounding Protocols: Authentication Logic Analysis and Collusion
                  Attacks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {279--298},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_12},
  doi          = {10.1007/978-0-387-46276-9\_12},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MeadowsPPCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esas/2007,
  editor       = {Frank Stajano and
                  Catherine Meadows and
                  Srdjan Capkun and
                  Tyler Moore},
  title        = {Security and Privacy in Ad-hoc and Sensor Networks, 4th European Workshop,
                  {ESAS} 2007, Cambridge, UK, July 2-3, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4572},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73275-4},
  doi          = {10.1007/978-3-540-73275-4},
  isbn         = {978-3-540-73274-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/EscobarMM06,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  title        = {A rewriting-based inference system for the {NRL} Protocol Analyzer
                  and its meta-logical properties},
  journal      = {Theor. Comput. Sci.},
  volume       = {367},
  number       = {1-2},
  pages        = {162--202},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.tcs.2006.08.035},
  doi          = {10.1016/J.TCS.2006.08.035},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/EscobarMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PavlovicM06,
  author       = {Dusko Pavlovic and
                  Catherine Meadows},
  editor       = {Dieter Gollmann and
                  Jan Meier and
                  Andrei Sabelfeld},
  title        = {Deriving Secrecy in Key Establishment Protocols},
  booktitle    = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
                  in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4189},
  pages        = {384--403},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11863908\_24},
  doi          = {10.1007/11863908\_24},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PavlovicM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/MeadowsSC06,
  author       = {Catherine Meadows and
                  Paul F. Syverson and
                  LiWu Chang},
  title        = {Towards More Efficient Distance Bounding Protocols for Use in Sensor
                  Networks},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359532},
  doi          = {10.1109/SECCOMW.2006.359532},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/MeadowsSC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/EscobarMM07,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Maribel Fern{\'{a}}ndez and
                  Claude Kirchner},
  title        = {Equational Cryptographic Reasoning in the Maude-NRL Protocol Analyzer},
  booktitle    = {Proceedings of the First International Workshop on Security and Rewriting
                  Techniques, SecReT@ICALP 2006, Venice, Italy, July 15, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {4},
  pages        = {23--36},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2007.02.053},
  doi          = {10.1016/J.ENTCS.2007.02.053},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/EscobarMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EscobarMM05,
  author       = {Santiago Escobar and
                  Catherine Meadows and
                  Jos{\'{e}} Meseguer},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {A rewriting-based inference system for the {NRL} protocol analyzer:
                  grammar generation},
  booktitle    = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103576.1103578},
  doi          = {10.1145/1103576.1103578},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/EscobarMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CervesatoMP05,
  author       = {Iliano Cervesato and
                  Catherine Meadows and
                  Dusko Pavlovic},
  title        = {An Encapsulated Authentication Logic for Reasoning about Key Distribution
                  Protocols},
  booktitle    = {18th {IEEE} Computer Security Foundations Workshop, {(CSFW-18} 2005),
                  20-22 June 2005, Aix-en-Provence, France},
  pages        = {48--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSFW.2005.7},
  doi          = {10.1109/CSFW.2005.7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/CervesatoMP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/LazosPMSC05,
  author       = {Loukas Lazos and
                  Radha Poovendran and
                  Catherine Meadows and
                  Paul F. Syverson and
                  LiWu Chang},
  title        = {Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic
                  approach},
  booktitle    = {{IEEE} Wireless Communications and Networking Conference, {WCNC} 2005,
                  March 13-17, 2005, New Orleans, Louisiana, {USA}},
  pages        = {1193--1199},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/WCNC.2005.1424678},
  doi          = {10.1109/WCNC.2005.1424678},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/LazosPMSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005,
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-226-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/popl/2005wits,
  editor       = {Catherine Meadows},
  title        = {Proceedings of the {POPL} 2005 Workshop on Issues in the Theory of
                  Security, {WITS} 2005, Long Beach, California, USA, January 10-11,
                  2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-58113-980-2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/popl/2005wits.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MeadowsSC04,
  author       = {Catherine Meadows and
                  Paul F. Syverson and
                  Iliano Cervesato},
  title        = {Formal specification and analysis of the Group Domain Of Interpretation
                  Protocol using {NPATRL} and the {NRL} Protocol Analyzer},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {893--931},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12604},
  doi          = {10.3233/JCS-2004-12604},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MeadowsSC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Meadows04,
  author       = {Catherine Meadows},
  title        = {Ordering from Satan's menu: a survey of requirements specification
                  for formal analysis of cryptographic protocols},
  journal      = {Sci. Comput. Program.},
  volume       = {50},
  number       = {1-3},
  pages        = {3--22},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.scico.2003.12.001},
  doi          = {10.1016/J.SCICO.2003.12.001},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scp/Meadows04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MeadowsP04,
  author       = {Catherine Meadows and
                  Dusko Pavlovic},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Deriving, Attacking and Defending the {GDOI} Protocol},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {53--72},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_4},
  doi          = {10.1007/978-3-540-30108-0\_4},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MeadowsP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LynchM04,
  author       = {Christopher Lynch and
                  Catherine Meadows},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Sound Approximations to Diffie-Hellman Using Rewrite Rules},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {262--277},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_21},
  doi          = {10.1007/978-3-540-30191-2\_21},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LynchM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/LynchM05,
  author       = {Christopher Lynch and
                  Catherine Meadows},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {On the Relative Soundness of the Free Algebra Model for Public Key
                  Encryption},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {43--54},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.018},
  doi          = {10.1016/J.ENTCS.2004.05.018},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/LynchM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/Meadows03,
  author       = {Catherine Meadows},
  title        = {Formal methods for cryptographic protocol analysis: emerging issues
                  and trends},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {21},
  number       = {1},
  pages        = {44--54},
  year         = {2003},
  url          = {https://doi.org/10.1109/JSAC.2002.806125},
  doi          = {10.1109/JSAC.2002.806125},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/Meadows03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BackesMM03,
  author       = {Michael Backes and
                  Catherine Meadows and
                  John C. Mitchell},
  editor       = {Michael Backes and
                  David A. Basin},
  title        = {Relating cryptography and formal methods: a panel},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2003, Washington, DC, USA, October 30, 2003},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/1035429.1035436},
  doi          = {10.1145/1035429.1035436},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BackesMM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows03,
  author       = {Catherine Meadows},
  title        = {A Procedure for Verifying Security Against Type Confusion Attacks},
  booktitle    = {16th {IEEE} Computer Security Foundations Workshop {(CSFW-16} 2003),
                  30 June - 2 July 2003, Pacific Grove, CA, {USA}},
  pages        = {62},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSFW.2003.1212705},
  doi          = {10.1109/CSFW.2003.1212705},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esop/Meadows03,
  author       = {Catherine Meadows},
  editor       = {Pierpaolo Degano},
  title        = {What Makes a Cryptographic Protocol Secure? The Evolution of Requirements
                  Specification in Formal Cryptographic Protocol Analysis},
  booktitle    = {Programming Languages and Systems, 12th European Symposium on Programming,
                  {ESOP} 2003, Held as Part of the Joint European Conferences on Theory
                  and Practice of Software, {ETAPS} 2003, Warsaw, Poland, April 7-11,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2618},
  pages        = {10--21},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36575-3\_2},
  doi          = {10.1007/3-540-36575-3\_2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esop/Meadows03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/CanettiMS02,
  author       = {Ran Canetti and
                  Catherine Meadows and
                  Paul F. Syverson},
  editor       = {Mitsuhiro Okada and
                  Benjamin C. Pierce and
                  Andre Scedrov and
                  Hideyuki Tokuda and
                  Akinori Yonezawa},
  title        = {Environmental Requirements for Authentication Protocols},
  booktitle    = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
                  Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2609},
  pages        = {339--355},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36532-X\_21},
  doi          = {10.1007/3-540-36532-X\_21},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isss2/CanettiMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/padl/Meadows02,
  author       = {Catherine Meadows},
  editor       = {Shriram Krishnamurthi and
                  C. R. Ramakrishnan},
  title        = {Using a Declarative Language to Build an Experimental Analysis Tool},
  booktitle    = {Practical Aspects of Declarative Languages, 4th International Symposium,
                  {PADL} 2002, Portland, OR, USA, January 19-20, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2257},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45587-6\_1},
  doi          = {10.1007/3-540-45587-6\_1},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/padl/Meadows02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/X01,
  author       = {Dieter Gollmann and
                  Catherine A. Meadows and
                  Eiji Okamoto},
  title        = {Editorial},
  journal      = {Int. J. Inf. Sec.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2001},
  url          = {https://doi.org/10.1007/s102070100004},
  doi          = {10.1007/S102070100004},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/X01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Meadows01,
  author       = {Catherine Meadows},
  title        = {A Cost-Based Framework for Analysis of Denial of Service Networks},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {1/2},
  pages        = {143--164},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-91-206},
  doi          = {10.3233/JCS-2001-91-206},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Meadows01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MeadowsS01,
  author       = {Catherine Meadows and
                  Paul F. Syverson},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Formalizing {GDOI} group key management requirements in {NPATRL}},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {235--244},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502016},
  doi          = {10.1145/501983.502016},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MeadowsS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/Meadows01,
  author       = {Catherine Meadows},
  editor       = {Vladimir I. Gorodetski and
                  Victor A. Skormin and
                  Leonard J. Popyack},
  title        = {Open Issues in Formal Methods for Cryptographic Protocol Analysis},
  booktitle    = {Information Assurance in Computer Networks: Methods, Models, and Architectures
                  for Network Security, International Workshop {MMM-ACNS} 2001, St.
                  Petersburg, Russia, May 21-23, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2052},
  pages        = {21},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45116-1\_3},
  doi          = {10.1007/3-540-45116-1\_3},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/Meadows01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vis/Meadows01,
  author       = {Catherine Meadows},
  editor       = {Dirk Fox and
                  Marit K{\"{o}}hntopp and
                  Andreas Pfitzmann},
  title        = {Experiences in the Formal Analysis of the Group Domain of Interpretation
                  Protocol {(GDOI)}},
  booktitle    = {Verl{\"{a}}ssliche IT-Systeme 2001: Sicherheit in komplexen IT-Infrastrukturen,
                  Proceedings der GI-Fachtagung {VIS} 2001, 12.-14.09.2001 in Kiel},
  pages        = {147--150},
  publisher    = {Vieweg+Teubner Verlag},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-3-663-05918-9\_10},
  doi          = {10.1007/978-3-663-05918-9\_10},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vis/Meadows01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/StubblebineM00,
  author       = {Stuart G. Stubblebine and
                  Catherine A. Meadows},
  title        = {Formal characterization and automated analysis of known-pair and chosen-text
                  attacks},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {18},
  number       = {4},
  pages        = {571--581},
  year         = {2000},
  url          = {https://doi.org/10.1109/49.839933},
  doi          = {10.1109/49.839933},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/StubblebineM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/Meadows00,
  author       = {Catherine Meadows},
  editor       = {E. Allen Emerson and
                  A. Prasad Sistla},
  title        = {Invited Address: Applying Formal Methods to Cryptographic Protocol
                  Analysis},
  booktitle    = {Computer Aided Verification, 12th International Conference, {CAV}
                  2000, Chicago, IL, USA, July 15-19, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1855},
  pages        = {2},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722167\_2},
  doi          = {10.1007/10722167\_2},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/Meadows00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows00,
  author       = {Catherine Meadows},
  title        = {Invariant Generation Techniques in Cryptographic Protocol Analysis},
  booktitle    = {Proceedings of the 13th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} '00, Cambridge, England, UK, July 3-5, 2000},
  pages        = {159--167},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/CSFW.2000.856934},
  doi          = {10.1109/CSFW.2000.856934},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/MeadowsS99,
  author       = {Catherine Meadows and
                  William H. Sanders},
  title        = {Guest Editorial: Introduction to the Special Section - Dependable
                  Computing for Critical Applications {(DCCA-6)}},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {25},
  number       = {5},
  pages        = {601--602},
  year         = {1999},
  url          = {http://doi.ieeecomputersociety.org/10.1109/TSE.1999.10006},
  doi          = {10.1109/TSE.1999.10006},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/MeadowsS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows99,
  author       = {Catherine Meadows},
  title        = {A Formal Framework and Evaluation Method for Network Denial of Service},
  booktitle    = {Proceedings of the 12th {IEEE} Computer Security Foundations Workshop,
                  {CSFW} 1999, Mordano, Italy, June 28-30, 1999},
  pages        = {4--13},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSFW.1999.779758},
  doi          = {10.1109/CSFW.1999.779758},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows99,
  author       = {Catherine Meadows},
  title        = {Analysis of the Internet Key Exchange Protocol using the {NRL} Protocol
                  Analyzer},
  booktitle    = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California,
                  USA, May 9-12, 1999},
  pages        = {216--231},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/SECPRI.1999.766916},
  doi          = {10.1109/SECPRI.1999.766916},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MeadowsV99,
  author       = {Catherine Meadows and
                  Dennis M. Volpano},
  editor       = {Stephen D. Brookes and
                  Achim Jung and
                  Michael W. Mislove and
                  Andre Scedrov},
  title        = {The {MFPS} {XV} Security Session},
  booktitle    = {Fifteenth Conference on Mathematical Foundations of Progamming Semantics,
                  {MFPS} 1999, Tulane University, New Orleans, LA, USA, April 28 - May
                  1, 1999},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {20},
  pages        = {76--79},
  publisher    = {Elsevier},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1571-0661(04)80067-7},
  doi          = {10.1016/S1571-0661(04)80067-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/MeadowsV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/GorrieriSAFGLM98,
  author       = {Roberto Gorrieri and
                  Paul F. Syverson and
                  Mart{\'{\i}}n Abadi and
                  Riccardo Focardi and
                  Dieter Gollmann and
                  Gavin Lowe and
                  Catherine Meadows},
  title        = {Panel Introduction: Varieties of Authentication},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {79--82},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.ieeecomputersociety.org/10.1109/CSFW.1998.10000},
  doi          = {10.1109/CSFW.1998.10000},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/GorrieriSAFGLM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MeadowsS98,
  author       = {Catherine Meadows and
                  Paul F. Syverson},
  editor       = {Rafael Hirschfeld},
  title        = {A Formal Specification of Requirements for Payment Transactions in
                  the {SET} Protocol},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {122--140},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055477},
  doi          = {10.1007/BFB0055477},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/MeadowsS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/1998,
  editor       = {Jean{-}Jacques Quisquater and
                  Yves Deswarte and
                  Catherine Meadows and
                  Dieter Gollmann},
  title        = {Computer Security - {ESORICS} 98, 5th European Symposium on Research
                  in Computer Security, Louvain-la-Neuve, Belgium, September 16-18,
                  1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1485},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055851},
  doi          = {10.1007/BFB0055851},
  isbn         = {3-540-65004-0},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows97,
  author       = {Catherine Meadows},
  title        = {Languages for Formal Specification of Security Protocols},
  booktitle    = {10th Computer Security Foundations Workshop {(CSFW} '97), June 10-12,
                  1997, Rockport, Massachusetts, {USA}},
  pages        = {96--97},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/CSFW.1997.596792},
  doi          = {10.1109/CSFW.1997.596792},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Meadows97,
  author       = {Catherine Meadows},
  editor       = {Tom Haigh and
                  Bob Blakley and
                  Mary Ellen Zurko and
                  Catherine Meodaws},
  title        = {Three paradigms in computer security},
  booktitle    = {Proceedings of the 1997 Workshop on New Security Paradigms, Langdale,
                  Cumbria, United Kingdom, September 23-26, 1997},
  pages        = {34--37},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/283699.283737},
  doi          = {10.1145/283699.283737},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Meadows97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SyversonM96,
  author       = {Paul F. Syverson and
                  Catherine Meadows},
  title        = {A Formal Language for Cryptographic Protocol Requirements},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {27--59},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018069220646},
  doi          = {10.1023/A:1018069220646},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SyversonM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Meadows96,
  author       = {Catherine Meadows},
  title        = {The {NRL} Protocol Analyzer: An Overview},
  journal      = {J. Log. Program.},
  volume       = {26},
  number       = {2},
  pages        = {113--131},
  year         = {1996},
  url          = {https://doi.org/10.1016/0743-1066(95)00095-X},
  doi          = {10.1016/0743-1066(95)00095-X},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jlp/Meadows96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/Meadows96,
  author       = {Catherine Meadows},
  title        = {Guest Editorial: Introduction to the Special Section - Best Papers
                  of the 1995 {IEEE} Symposium on Security and Privacy},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {22},
  number       = {5},
  pages        = {281--282},
  year         = {1996},
  url          = {http://doi.ieeecomputersociety.org/10.1109/TSE.1996.10003},
  doi          = {10.1109/TSE.1996.10003},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/Meadows96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows96,
  author       = {Catherine Meadows},
  title        = {Language generation and verification in the {NRL} protocol analyzer},
  booktitle    = {Ninth {IEEE} Computer Security Foundations Workshop, March 10 - 12,
                  1996, Dromquinna Manor, Kenmare, County Kerry, Ireland},
  pages        = {48--61},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/CSFW.1996.503690},
  doi          = {10.1109/CSFW.1996.503690},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimacs/Meadows96,
  author       = {Catherine Meadows},
  editor       = {Rebecca N. Wright and
                  Peter G. Neumann},
  title        = {A representation of protocol attacks for risk assessment},
  booktitle    = {Network Threats, Proceedings of a {DIMACS} Workshop, December 2-4,
                  1996},
  series       = {{DIMACS} Series in Discrete Mathematics and Theoretical Computer Science},
  volume       = {38},
  pages        = {1--10},
  publisher    = {{DIMACS/AMS}},
  year         = {1996},
  url          = {https://doi.org/10.1090/dimacs/038/01},
  doi          = {10.1090/DIMACS/038/01},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dimacs/Meadows96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Meadows96,
  author       = {Catherine A. Meadows},
  editor       = {Elisa Bertino and
                  Helmut Kurth and
                  Giancarlo Martella and
                  Emilio Montolivo},
  title        = {Analyzing the Needham-Schroeder Public-Key Protocol: {A} Comparison
                  of Two Approaches},
  booktitle    = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
                  in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {351--364},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61770-1\_46},
  doi          = {10.1007/3-540-61770-1\_46},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Meadows96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/MeadowsM96,
  author       = {Catherine Meadows and
                  Ira S. Moskowitz},
  editor       = {Ross J. Anderson},
  title        = {Covert Channels - {A} Context-Based View},
  booktitle    = {Information Hiding, First International Workshop, Cambridge, UK, May
                  30 - June 1, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1174},
  pages        = {73--93},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61996-8\_33},
  doi          = {10.1007/3-540-61996-8\_33},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/MeadowsM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/SimmonsM95,
  author       = {Gustavus J. Simmons and
                  Catherine Meadows},
  title        = {The Role of Trust in Information Integrity Protocols},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {71--84},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3106},
  doi          = {10.3233/JCS-1994/1995-3106},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/SimmonsM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Meadows95,
  author       = {Catherine Meadows},
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Applying the dependability paradigm to computer security},
  booktitle    = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  pages        = {75--79},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/NSPW.1995.492346},
  doi          = {10.1109/NSPW.1995.492346},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Meadows95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1995,
  editor       = {Hilary H. Hosmer and
                  John E. Dobson and
                  Catherine Meadows},
  title        = {Proceedings of the 1995 Workshop on New Security Paradigms, San Diego,
                  CA, {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/3552/proceeding},
  isbn         = {0-8186-7318-4},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1995.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KemmererMM94,
  author       = {Richard A. Kemmerer and
                  Catherine Meadows and
                  Jonathan K. Millen},
  title        = {Three System for Cryptographic Protocol Analysis},
  journal      = {J. Cryptol.},
  volume       = {7},
  number       = {2},
  pages        = {79--130},
  year         = {1994},
  url          = {https://doi.org/10.1007/BF00197942},
  doi          = {10.1007/BF00197942},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KemmererMM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Meadows94,
  author       = {Catherine A. Meadows},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Formal Verification of Cryptographic Protocols: {A} Survey},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000430},
  doi          = {10.1007/BFB0000430},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Meadows94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows94,
  author       = {Catherine Meadows},
  title        = {A Model of Computation for the {NRL} Protocol Analyzer},
  booktitle    = {Seventh {IEEE} Computer Security Foundations Workshop - CSFW'94, Franconia,
                  New Hampshire, USA, June 14-16, 1994, Proceedings},
  pages        = {84--89},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/CSFW.1994.315945},
  doi          = {10.1109/CSFW.1994.315945},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SyversonM94,
  author       = {Paul F. Syverson and
                  Catherine Meadows},
  editor       = {Alfredo De Santis},
  title        = {Formal Requirements for Key Distribution Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
                  Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
                  1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {950},
  pages        = {320--331},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0053447},
  doi          = {10.1007/BFB0053447},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SyversonM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/Meadows93,
  author       = {Catherine Meadows},
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {An outline of a taxonomy of computer security research and development},
  booktitle    = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  pages        = {33--35},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751.283770},
  doi          = {10.1145/283751.283770},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/Meadows93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SyversonM93,
  author       = {Paul Syverson and
                  Catherine Meadows},
  title        = {A logical language for specifying cryptographic protocol requirements},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {165--177},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287634},
  doi          = {10.1109/RISP.1993.287634},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SyversonM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/1993,
  editor       = {James Bret Michael and
                  Victoria Ashby and
                  Catherine Meadows},
  title        = {Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept.
                  22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, {USA}},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/283751},
  doi          = {10.1145/283751},
  isbn         = {0-8186-5430-9},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/1993.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Meadows92,
  author       = {Catherine Meadows},
  title        = {Applying Formal Methods to the Analysis of a Key Management Protocol},
  journal      = {J. Comput. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {5--36},
  year         = {1992},
  url          = {https://doi.org/10.3233/JCS-1992-1102},
  doi          = {10.3233/JCS-1992-1102},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Meadows92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows92,
  author       = {Catherine Meadows},
  title        = {Panel: Fundamental Questions about Formal Methods},
  booktitle    = {5th {IEEE} Computer Security Foundations Workshop - CSFW'92, Franconia,
                  New Hampshire, USA, June 16-18, 1992, Proceedings},
  pages        = {52},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows92,
  author       = {Catherine Meadows},
  title        = {Using traces based on procedure calls to reason about composability},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {177--188},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213262},
  doi          = {10.1109/RISP.1992.213262},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows91,
  author       = {Catherine Meadows},
  title        = {The {NRL} Protocol Analysis Tool: {A} Position Paper},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {227},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSFW.1991.151592},
  doi          = {10.1109/CSFW.1991.151592},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows91a,
  author       = {Catherine Meadows},
  title        = {Panel Discussion on the Polyinstantiation Problem: An Introduction},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {234},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows91a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Meadows91,
  author       = {Catherine Meadows},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {Discussion Summary},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {387--397},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Meadows91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows91,
  author       = {Catherine Meadows},
  title        = {A System for the Specification and Verification of Key Management
                  Protocols},
  booktitle    = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 20-22, 1991},
  pages        = {182--197},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/RISP.1991.130786},
  doi          = {10.1109/RISP.1991.130786},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Meadows90,
  author       = {Catherine Meadows},
  title        = {Representing Partial Knowledge in an Algebraic Security Model},
  booktitle    = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia,
                  New Hampshire, USA, June 12-14, 1990, Proceedings},
  pages        = {23--31},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSFW.1990.128182},
  doi          = {10.1109/CSFW.1990.128182},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Meadows90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Meadows90,
  author       = {Catherine Meadows},
  editor       = {Sushil Jajodia and
                  Carl E. Landwehr},
  title        = {Policies for Dynamic Upgrading},
  booktitle    = {Database Security, {IV:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21,
                  1990},
  pages        = {241--250},
  publisher    = {North-Holland},
  year         = {1990},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Meadows90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Meadows90a,
  author       = {Catherine Meadows},
  editor       = {Sushil Jajodia and
                  Carl E. Landwehr},
  title        = {Discussion Summary},
  booktitle    = {Database Security, {IV:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21,
                  1990},
  pages        = {395--404},
  publisher    = {North-Holland},
  year         = {1990},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Meadows90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows90,
  author       = {Catherine Meadows},
  title        = {Extending the Brewer-Nash Model to a Multilevel Context},
  booktitle    = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 7-9, 1990},
  pages        = {95--103},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/RISP.1990.63842},
  doi          = {10.1109/RISP.1990.63842},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Meadows89,
  author       = {Catherine Meadows},
  editor       = {David L. Spooner and
                  Carl E. Landwehr},
  title        = {Constructing Containers Using a Multilevel Relational Data Model},
  booktitle    = {Database Security, {III:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Monterey, California, USA,
                  September 5-7, 1989},
  pages        = {127--141},
  publisher    = {North-Holland},
  year         = {1989},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Meadows89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows89,
  author       = {Catherine Meadows},
  title        = {Using Narrowing in the Analysis of Key Management Protocols},
  booktitle    = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 1-3, 1989},
  pages        = {138--147},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SECPRI.1989.36288},
  doi          = {10.1109/SECPRI.1989.36288},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FroscherM88,
  author       = {Judith N. Froscher and
                  Catherine Meadows},
  editor       = {Carl E. Landwehr},
  title        = {Achieving a Trusted Database Management System Using Parallelism},
  booktitle    = {Database Security, {II:} Status and Prospects. Result of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Kingston, Ontario, Canada,
                  October 5-7, 1988},
  pages        = {151--160},
  publisher    = {North-Holland},
  year         = {1988},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/FroscherM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/MeadowsM87,
  author       = {Catherine Meadows and
                  David Mutchler},
  title        = {Matching Secrets in the Absence of a Continuously Available Trusted
                  Authority},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {13},
  number       = {2},
  pages        = {289--292},
  year         = {1987},
  url          = {https://doi.org/10.1109/TSE.1987.233152},
  doi          = {10.1109/TSE.1987.233152},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/MeadowsM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MeadowsJ87,
  author       = {Catherine Meadows and
                  Sushil Jajodia},
  editor       = {Carl E. Landwehr},
  title        = {Integrity Versus Security in Multi-Level Secure Databases},
  booktitle    = {Database Security: Status and Prospects. Results of the {IFIP} {WG}
                  11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987},
  pages        = {89--101},
  publisher    = {North-Holland},
  year         = {1987},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MeadowsJ87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/JajodiaM87,
  author       = {Sushil Jajodia and
                  Catherine A. Meadows},
  title        = {Mutual Consistency in Decentralized Distributed Systems},
  booktitle    = {Proceedings of the Third International Conference on Data Engineering,
                  February 3-5, 1987, Los Angeles, California, {USA}},
  pages        = {396--404},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://doi.org/10.1109/ICDE.1987.7272405},
  doi          = {10.1109/ICDE.1987.7272405},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/JajodiaM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows87,
  author       = {Catherine Meadows},
  title        = {The Integrity Lock Architecture and Its Application to Message Systems:
                  Reducing Covert Channels},
  booktitle    = {Proceedings of the 1987 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 27-29, 1987},
  pages        = {212--219},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://doi.org/10.1109/SP.1987.10008},
  doi          = {10.1109/SP.1987.10008},
  timestamp    = {Thu, 21 Sep 2023 15:57:33 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Meadows86,
  author       = {Catherine Meadows},
  title        = {A More Efficient Cryptographic Matchmaking Protocol for Use in the
                  Absence of a Continuously Available Third Party},
  booktitle    = {Proceedings of the 1986 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 7-9, 1986},
  pages        = {134--137},
  publisher    = {{IEEE} Computer Society},
  year         = {1986},
  url          = {https://doi.org/10.1109/SP.1986.10022},
  doi          = {10.1109/SP.1986.10022},
  timestamp    = {Thu, 21 Sep 2023 15:57:33 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Meadows86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlakleyMP85,
  author       = {G. R. Blakley and
                  Catherine Meadows and
                  George B. Purdy},
  editor       = {Hugh C. Williams},
  title        = {Fingerprinting Long Forgiving Messages},
  booktitle    = {Advances in Cryptology - {CRYPTO} '85, Santa Barbara, California,
                  USA, August 18-22, 1985, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {218},
  pages        = {180--189},
  publisher    = {Springer},
  year         = {1985},
  url          = {https://doi.org/10.1007/3-540-39799-X\_15},
  doi          = {10.1007/3-540-39799-X\_15},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlakleyMP85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlakleyM85,
  author       = {G. R. Blakley and
                  Catherine Meadows},
  title        = {A Database Encryption Scheme Which Allows the Computation of Statistics
                  Using Encrypted Data},
  booktitle    = {1985 {IEEE} Symposium on Security and Privacy, Oakland, CA, USA, April
                  22-24, 1985},
  pages        = {116--122},
  publisher    = {{IEEE} Computer Society},
  year         = {1985},
  url          = {https://doi.org/10.1109/SP.1985.10024},
  doi          = {10.1109/SP.1985.10024},
  timestamp    = {Thu, 21 Sep 2023 15:57:33 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BlakleyM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlakleyM84,
  author       = {G. R. Blakley and
                  Catherine Meadows},
  editor       = {G. R. Blakley and
                  David Chaum},
  title        = {Security of Ramp Schemes},
  booktitle    = {Advances in Cryptology, Proceedings of {CRYPTO} '84, Santa Barbara,
                  California, USA, August 19-22, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {196},
  pages        = {242--268},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39568-7\_20},
  doi          = {10.1007/3-540-39568-7\_20},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlakleyM84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics