D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 35 Citations 7,006 106 World Ranking 6059 National Ranking 2891

Overview

What is she best known for?

The fields of study she is best known for:

  • Programming language
  • Operating system
  • Cryptography

Her scientific interests lie mostly in Cryptography, Cryptographic protocol, Computer security, Communications protocol and Theoretical computer science. The various areas that she examines in her Cryptography study include Computer network, Information security and Public-key cryptography. Her work in the fields of Cryptographic primitive overlaps with other areas such as Packet analyzer.

Her Computer security research is multidisciplinary, relying on both Wireless sensor network, Formal methods and Internet privacy. Her Formal methods study combines topics from a wide range of disciplines, such as Authentication protocol and Formal verification. Catherine Meadows interconnects Rewriting, Protocol and Search algorithm in the investigation of issues within Theoretical computer science.

Her most cited work include:

  • The NRL Protocol Analyzer: An Overview☆ (449 citations)
  • Security of ramp schemes (338 citations)
  • Three systems for cryptographic protocol analysis (228 citations)

What are the main themes of her work throughout her whole career to date?

Catherine Meadows spends much of her time researching Cryptographic protocol, Computer security, Theoretical computer science, Cryptography and Programming language. In the field of Cryptographic protocol, her study on Cryptographic primitive overlaps with subjects such as Packet analyzer. Catherine Meadows usually deals with Cryptographic primitive and limits it to topics linked to Key management and Key exchange.

Her Computer security study deals with Software engineering intersecting with The Internet. Her Theoretical computer science study integrates concerns from other disciplines, such as Cryptosystem, Rewriting, Soundness and Unification. Principal is closely connected to Communications protocol in her research, which is encompassed under the umbrella topic of Cryptography.

She most often published in these fields:

  • Cryptographic protocol (48.57%)
  • Computer security (35.00%)
  • Theoretical computer science (30.71%)

What were the highlights of her more recent work (between 2012-2020)?

  • Cryptographic protocol (48.57%)
  • Theoretical computer science (30.71%)
  • Modulo (8.57%)

In recent papers she was focusing on the following fields of study:

The scientist’s investigation covers issues in Cryptographic protocol, Theoretical computer science, Modulo, Unification and Programming language. Her Cryptographic protocol study is within the categories of Protocol and Computer security. Her research in Computer security intersects with topics in Formal methods and Application programming interface.

Her work deals with themes such as Cryptosystem and Rewriting, which intersect with Theoretical computer science. Her Modulo research focuses on Algorithm and how it relates to Polynomial. The study incorporates disciplines such as String and Set in addition to Unification.

Between 2012 and 2020, her most popular works were:

  • Model Checking Security Protocols (30 citations)
  • A Formal Definition of Protocol Indistinguishability and Its Verification Using Maude-NPA (27 citations)
  • State space reduction in the Maude-NRL Protocol Analyzer (19 citations)

In her most recent research, the most cited papers focused on:

  • Programming language
  • Operating system
  • Cryptography

Her primary areas of study are Cryptographic protocol, Theoretical computer science, Modulo, Cryptosystem and Unification. Her Cryptographic protocol study combines topics in areas such as Discrete mathematics, Mathematical proof and Set. Her Mathematical proof research incorporates elements of Variety and State.

The concepts of her Theoretical computer science study are interwoven with issues in Formal semantics and If and only if. Her studies deal with areas such as Axiom and Formal verification as well as Cryptosystem. Her Protocol research includes themes of Computer security, Application programming interface and Class.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

The NRL Protocol Analyzer: An Overview☆

Catherine A. Meadows.
Journal of Logic Programming (1996)

739 Citations

Security of ramp schemes

G R Blakley;Catherine Meadows.
international cryptology conference (1985)

513 Citations

Formal Verification of Cryptographic Protocols: A Survey

Catherine Meadows.
international cryptology conference (1994)

358 Citations

Three systems for cryptographic protocol analysis

R. Kemmerer;C. Meadows;J. Millen.
Journal of Cryptology (1994)

342 Citations

Formal methods for cryptographic protocol analysis: emerging issues and trends

C. Meadows.
IEEE Journal on Selected Areas in Communications (2003)

324 Citations

A formal framework and evaluation method for network denial of service

C. Meadows.
ieee computer security foundations symposium (1999)

271 Citations

Applying Formal Methods to the Analysis of a Key Management Protocol

Catherine Meadows.
Journal of Computer Security (1992)

255 Citations

Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach

L. Lazos;R. Poovendran;C. Meadows;P. Syverson.
wireless communications and networking conference (2005)

221 Citations

Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer

C. Meadows.
ieee symposium on security and privacy (1999)

218 Citations

Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties

Santiago Escobar;Catherine Meadows;José Meseguer.
Foundations of Security Analysis and Design V (2009)

212 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Catherine Meadows

José Meseguer

José Meseguer

University of Illinois at Urbana-Champaign

Publications: 44

Andre Scedrov

Andre Scedrov

University of Pennsylvania

Publications: 39

John C. Mitchell

John C. Mitchell

Stanford University

Publications: 37

Birgit Pfitzmann

Birgit Pfitzmann

IBM (United States)

Publications: 37

David Basin

David Basin

ETH Zurich

Publications: 37

Martín Abadi

Martín Abadi

University of California, Santa Cruz

Publications: 28

Lawrence C. Paulson

Lawrence C. Paulson

University of Cambridge

Publications: 24

Srdjan Capkun

Srdjan Capkun

ETH Zurich

Publications: 23

Cas Cremers

Cas Cremers

University of Oxford

Publications: 22

Carolyn L. Talcott

Carolyn L. Talcott

SRI International

Publications: 22

Bruno Blanchet

Bruno Blanchet

French Institute for Research in Computer Science and Automation - INRIA

Publications: 21

Colin Boyd

Colin Boyd

Norwegian University of Science and Technology

Publications: 21

Anupam Datta

Anupam Datta

Carnegie Mellon University

Publications: 20

Michael Waidner

Michael Waidner

TU Darmstadt

Publications: 19

Joshua Guttman

Joshua Guttman

Worcester Polytechnic Institute

Publications: 19

Steve Schneider

Steve Schneider

University of Surrey

Publications: 18

Trending Scientists

Bibhas C. Giri

Bibhas C. Giri

Jadavpur University

Shiqiang Wei

Shiqiang Wei

University of Science and Technology of China

Emil Fischer

Emil Fischer

University of Würzburg

Huanghao Yang

Huanghao Yang

Fuzhou University

David Smith

David Smith

University of Oxford

Chao Gao

Chao Gao

Zhejiang University

Garry D. Peterson

Garry D. Peterson

Stockholm Resilience Centre

Karin Persson Waller

Karin Persson Waller

Swedish University of Agricultural Sciences

David W. Hoskin

David W. Hoskin

Dalhousie University

Carolina Lithgow-Bertelloni

Carolina Lithgow-Bertelloni

University of California, Los Angeles

Paul V. Bolstad

Paul V. Bolstad

University of Minnesota

Kensaku Mori

Kensaku Mori

University of Tokyo

Kristin A. Moore

Kristin A. Moore

Child Trends

Mical Paul

Mical Paul

Rambam Health Care Campus

Roger A. Warnke

Roger A. Warnke

Stanford University

Diana L. Miglioretti

Diana L. Miglioretti

University of California, Davis

Something went wrong. Please try again later.