Abstract
This anecdotal note describes Cathy Meadow’s leadership role in formal specification and verification of cryptographic protocols. Cathy has been a central figure in protocol analysis through her significant research and successful efforts to bring researchers together to form a unified, cohesive, and effective community to design and evaluate cryptographic protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Millen, J.: The interrogator: a tool for cryptographic protocol security. In: Proceedings 1984 Symposium on Security and Privacy. IEEE Computer Security Society (1984)
Meadows, C.: The NRL protocol analyzer: an overview. J. Log. Program. 26, 113–131 (1996)
Kemmerer, R.: Analyzing encryption protocols using formal verification techniques. IEEE J. Sel. Areas Commun. 7(4), 448–457 (1989)
Meadows, C.: Applying formal methods to the analysis of a key management protocol. J. Comput. Secur. 1(1), 5–35 (1992)
Fábrega, J.T., Herzog, J., Guttman, J.: Strand spaces: why is a security protocol correct? In: The IEEE Symposium on Security and Privacy (1998)
Syverson, P.: Formal semantics for logics of cryptographic protocols. In: The Computer Security Foundations Workshop (1990)
Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: Relating strands and multiset rewriting for security protocol analysis. In: The Computer Security Foundations Workshop (2000)
Cervesato, I., Durgin, N., Lincoln, P., Mitchell, J., Scedrov, A.: A comparison between strand spaces and multiset rewriting for security protocol analysis. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 356–383. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36532-X_22
Anlauff, M., Pavlovic, D., Waldinger, R., Westfold, S.: Proving authentication properties in the protocol derivation assistant. Kestrel Institute (2006)
Talcott, C.: A Maude-PVS tool for Strand Spaces. Protocol eXchange (2004)
Talcott, C., Owre, S.: CPSA + Maude + PDA + PVS. Protocol eXchange (2005)
Owre, S., Rushby, J.M., Shankar, N.: PVS: a prototype verification system. In: Kapur, D. (ed.) CADE 1992. LNCS, vol. 607, pp. 748–752. Springer, Heidelberg (1992). https://doi.org/10.1007/3-540-55602-8_217
Clavel, M., et al.: All About Maude: A High-Performance Logical Framework. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71999-1
Owre, S.: Maude2PVS. Protocol eXchange (2007)
Talcott, C.: TOOLIP Semantics & TOOLIP - Maude NPA. Protocol eXchange (2007)
Talcott, C.: TOOLIP Semantics & Interoperation. Protocol eXchange (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Pinsky, S. (2019). Cathy Meadows: A Central Figure in Protocol Analysis. In: Guttman, J., Landwehr, C., Meseguer, J., Pavlovic, D. (eds) Foundations of Security, Protocols, and Equational Reasoning. Lecture Notes in Computer Science(), vol 11565. Springer, Cham. https://doi.org/10.1007/978-3-030-19052-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-19052-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-19051-4
Online ISBN: 978-3-030-19052-1
eBook Packages: Computer ScienceComputer Science (R0)