The NRL protocol analyzer: An overview C Meadows The Journal of Logic Programming 26 (2), 113-131, 1996 | 755 | 1996 |
Security of ramp schemes GR Blakley, C Meadows Advances in Cryptology, 242-268, 1985 | 574 | 1985 |
Formal verification of cryptographic protocols: A survey CA Meadows International Conference on the Theory and Application of Cryptology, 133-150, 1994 | 382 | 1994 |
Three systems for cryptographic protocol analysis R Kemmerer, C Meadows, J Millen Journal of CRYPTOLOGY 7 (2), 79-130, 1994 | 353 | 1994 |
Formal methods for cryptographic protocol analysis: Emerging issues and trends C Meadows IEEE journal on selected areas in communications 21 (1), 44-54, 2003 | 329 | 2003 |
Maude-NPA: Cryptographic protocol analysis modulo equational properties S Escobar, C Meadows, J Meseguer Foundations of Security Analysis and Design V, 1-50, 2009 | 297 | 2009 |
A formal framework and evaluation method for network denial of service C Meadows Proceedings of the 12th IEEE computer security foundations workshop, 4-13, 1999 | 270 | 1999 |
Applying formal methods to the analysis of a key management protocol C Meadows Journal of Computer Security 1 (1), 5-35, 1992 | 268 | 1992 |
Applying formal methods to the analysis of a key management protocol CA Meadows NAVAL RESEARCH LAB WASHINGTON DC, 1990 | 268 | 1990 |
A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party C Meadows IEEE Symposium on Security and Privacy, 134-137, 1986 | 246 | 1986 |
Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer C Meadows Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No …, 1999 | 233 | 1999 |
Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach L Lazos, R Poovendran, C Meadows, P Syverson, LW Chang IEEE Wireless Communications and Networking Conference, 2005 2, 1193-1199, 2005 | 221 | 2005 |
A cost-based framework for analysis of denial of service in networks C Meadows Journal of Computer Security 9 (1-2), 143-164, 2001 | 194 | 2001 |
Open issues in formal methods for cryptographic protocol analysis C Meadows Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 181 | 2000 |
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches CA Meadows European Symposium on Research in Computer Security, 351-364, 1996 | 174 | 1996 |
Fingerprinting long forgiving messages GR Blakley, C Meadows, GB Purdy Advances in Cryptology—CRYPTO’85 Proceedings, 180-189, 1986 | 159 | 1986 |
A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties S Escobar, C Meadows, J Meseguer Theoretical Computer Science 367 (1-2), 162-202, 2006 | 146 | 2006 |
Model checking security protocols D Basin, C Cremers, C Meadows Handbook of Model Checking, 727-762, 2018 | 136 | 2018 |
Model Checking Security Protocols D Basin, C Cremers, C Meadows Handbook of Model Checking, 727-762, 2018 | 136 | 2018 |
A system for the specification and verification of key management protocols C Meadows Proceedings. 1991 IEEE Computer Society Symposium on Research in Security …, 1991 | 116 | 1991 |