Her scientific interests lie mostly in Cryptography, Cryptographic protocol, Computer security, Communications protocol and Theoretical computer science. The various areas that she examines in her Cryptography study include Computer network, Information security and Public-key cryptography. Her work in the fields of Cryptographic primitive overlaps with other areas such as Packet analyzer.
Her Computer security research is multidisciplinary, relying on both Wireless sensor network, Formal methods and Internet privacy. Her Formal methods study combines topics from a wide range of disciplines, such as Authentication protocol and Formal verification. Catherine Meadows interconnects Rewriting, Protocol and Search algorithm in the investigation of issues within Theoretical computer science.
Catherine Meadows spends much of her time researching Cryptographic protocol, Computer security, Theoretical computer science, Cryptography and Programming language. In the field of Cryptographic protocol, her study on Cryptographic primitive overlaps with subjects such as Packet analyzer. Catherine Meadows usually deals with Cryptographic primitive and limits it to topics linked to Key management and Key exchange.
Her Computer security study deals with Software engineering intersecting with The Internet. Her Theoretical computer science study integrates concerns from other disciplines, such as Cryptosystem, Rewriting, Soundness and Unification. Principal is closely connected to Communications protocol in her research, which is encompassed under the umbrella topic of Cryptography.
The scientist’s investigation covers issues in Cryptographic protocol, Theoretical computer science, Modulo, Unification and Programming language. Her Cryptographic protocol study is within the categories of Protocol and Computer security. Her research in Computer security intersects with topics in Formal methods and Application programming interface.
Her work deals with themes such as Cryptosystem and Rewriting, which intersect with Theoretical computer science. Her Modulo research focuses on Algorithm and how it relates to Polynomial. The study incorporates disciplines such as String and Set in addition to Unification.
Her primary areas of study are Cryptographic protocol, Theoretical computer science, Modulo, Cryptosystem and Unification. Her Cryptographic protocol study combines topics in areas such as Discrete mathematics, Mathematical proof and Set. Her Mathematical proof research incorporates elements of Variety and State.
The concepts of her Theoretical computer science study are interwoven with issues in Formal semantics and If and only if. Her studies deal with areas such as Axiom and Formal verification as well as Cryptosystem. Her Protocol research includes themes of Computer security, Application programming interface and Class.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
The NRL Protocol Analyzer: An Overview☆
Catherine A. Meadows.
Journal of Logic Programming (1996)
Security of ramp schemes
G R Blakley;Catherine Meadows.
international cryptology conference (1985)
Formal Verification of Cryptographic Protocols: A Survey
international cryptology conference (1994)
Three systems for cryptographic protocol analysis
R. Kemmerer;C. Meadows;J. Millen.
Journal of Cryptology (1994)
Formal methods for cryptographic protocol analysis: emerging issues and trends
IEEE Journal on Selected Areas in Communications (2003)
A formal framework and evaluation method for network denial of service
ieee computer security foundations symposium (1999)
Applying Formal Methods to the Analysis of a Key Management Protocol
Journal of Computer Security (1992)
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach
L. Lazos;R. Poovendran;C. Meadows;P. Syverson.
wireless communications and networking conference (2005)
Analysis of the Internet Key Exchange protocol using the NRL Protocol Analyzer
ieee symposium on security and privacy (1999)
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
Santiago Escobar;Catherine Meadows;José Meseguer.
Foundations of Security Analysis and Design V (2009)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: