Skip to main content

Cathy Meadows: A Central Figure in Protocol Analysis

  • Chapter
  • First Online:
Foundations of Security, Protocols, and Equational Reasoning

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11565))

  • 397 Accesses

Abstract

This anecdotal note describes Cathy Meadow’s leadership role in formal specification and verification of cryptographic protocols. Cathy has been a central figure in protocol analysis through her significant research and successful efforts to bring researchers together to form a unified, cohesive, and effective community to design and evaluate cryptographic protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Millen, J.: The interrogator: a tool for cryptographic protocol security. In: Proceedings 1984 Symposium on Security and Privacy. IEEE Computer Security Society (1984)

    Google Scholar 

  2. Meadows, C.: The NRL protocol analyzer: an overview. J. Log. Program. 26, 113–131 (1996)

    Article  Google Scholar 

  3. Kemmerer, R.: Analyzing encryption protocols using formal verification techniques. IEEE J. Sel. Areas Commun. 7(4), 448–457 (1989)

    Article  Google Scholar 

  4. Meadows, C.: Applying formal methods to the analysis of a key management protocol. J. Comput. Secur. 1(1), 5–35 (1992)

    Article  Google Scholar 

  5. Fábrega, J.T., Herzog, J., Guttman, J.: Strand spaces: why is a security protocol correct? In: The IEEE Symposium on Security and Privacy (1998)

    Google Scholar 

  6. Syverson, P.: Formal semantics for logics of cryptographic protocols. In: The Computer Security Foundations Workshop (1990)

    Google Scholar 

  7. Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Relating strands and multiset rewriting for security protocol analysis. In: The Computer Security Foundations Workshop (2000)

    Google Scholar 

  8. Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: A comparison between strand spaces and multiset rewriting for security protocol analysis. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 356–383. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36532-X_22

    Chapter  MATH  Google Scholar 

  9. Anlauff, M., Pavlovic, D., Waldinger, R., Westfold, S.: Proving authentication properties in the protocol derivation assistant. Kestrel Institute (2006)

    Google Scholar 

  10. Talcott, C.: A Maude-PVS tool for Strand Spaces. Protocol eXchange (2004)

    Google Scholar 

  11. Talcott, C., Owre, S.: CPSA + Maude + PDA + PVS. Protocol eXchange (2005)

    Google Scholar 

  12. Owre, S., Rushby, J.M., Shankar, N.: PVS: a prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 748–752. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-55602-8_217

    Chapter  Google Scholar 

  13. Clavel, M., et al.: All About Maude: A High-Performance Logical Framework. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71999-1

    Book  MATH  Google Scholar 

  14. Owre, S.: Maude2PVS. Protocol eXchange (2007)

    Google Scholar 

  15. Talcott, C.: TOOLIP Semantics & TOOLIP - Maude NPA. Protocol eXchange (2007)

    Google Scholar 

  16. Talcott, C.: TOOLIP Semantics & Interoperation. Protocol eXchange (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sylvan Pinsky .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pinsky, S. (2019). Cathy Meadows: A Central Figure in Protocol Analysis. In: Guttman, J., Landwehr, C., Meseguer, J., Pavlovic, D. (eds) Foundations of Security, Protocols, and Equational Reasoning. Lecture Notes in Computer Science(), vol 11565. Springer, Cham. https://doi.org/10.1007/978-3-030-19052-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19052-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19051-4

  • Online ISBN: 978-3-030-19052-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics