Foundations of Security, Protocols, and Equational Reasoning Essays Dedicated to Catherine A. Meadows /

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019. Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her N...

Full description

Corporate Author: SpringerLink (Online service)
Other Authors: Guttman, Joshua D. (Editor, http://id.loc.gov/vocabulary/relators/edt), Landwehr, Carl E. (Editor, http://id.loc.gov/vocabulary/relators/edt), Meseguer, José. (Editor, http://id.loc.gov/vocabulary/relators/edt), Pavlovic, Dusko. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2019.
Edition:1st ed. 2019.
Series:Security and Cryptology ; 11565
Subjects:
Online Access:https://doi.org/10.1007/978-3-030-19052-1
Table of Contents:
  • Cathy Meadows: A Central Figure in Protocol Analysis
  • A Long, Slow Conversation
  • Key Reminiscences
  • Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method
  • Finding Intruder Knowledge with Cap Matching
  • Robust Declassification by Incremental Typing
  • JRIF: Reactive Information Flow Control for Java
  • Symbolic Timed Trace Equivalence
  • Symbolic Analysis of Identity-Based Protocols
  • Enrich-by-Need Protocol Analysis for Diffie-Hellman
  • Key Agreement via Protocols
  • Privacy protocols
  • A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols
  • Belenios: A Simple Private and Verifiable Electronic Voting System.