Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Strand spaces: proving security protocols correct
Journal of Computer Security
Using encryption for authentication in large networks of computers
Communications of the ACM
Authentication tests and the structure of bundles
Theoretical Computer Science
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
PVS: A Prototype Verification System
CADE-11 Proceedings of the 11th International Conference on Automated Deduction: Automated Deduction
On the security of public key protocols
On the security of public key protocols
Specification and analysis of the AER/NCA active network protocol suite in Real-Time Maude
Formal Methods in System Design
Erratum: Analyzing a Discrete Model of Aplysia Central Pattern Generator
CMSB '08 Proceedings of the 6th International Conference on Computational Methods in Systems Biology
A comparison between strand spaces and multiset rewriting for security protocol analysis
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
SFM'08 Proceedings of the Formal methods for the design of computer, communication, and software systems 8th international conference on Formal methods for computational systems biology
All about maude - a high-performance logical framework: how to specify, program and verify systems in rewriting logic
Which model to use for cortical spiking neurons?
IEEE Transactions on Neural Networks
Hi-index | 0.00 |
This paper describes both Carolyn Talcott's technical and leadership contributions to formal methods, cryptographic protocol analysis, and systems biology. Carolyn has played a vitally important leadership role in protocol analysis through her signicant research and bringing together leading members of the protocol analysis community. Her efforts have resulted in a unified, cohesive, and flexible foundation for the interoperation of maturing tools and techniques for designing and evaluating a wide range of protocols. As the leader of the Symbolic Systems Technology Group at SRI she has been a visionary manager with exceptionally strong technical skills who has guided, advised and mentored numerous scientists in the use of formal methods and other computational tools for modeling or solving diverse biological problems in cancer biology, signal transduction research, neuroscience, and infectious disease research.