Found 177 results
"Composite Signature Based Watermarking for Fingerprint Authentication", ACM Multimedia and Security Workshop, ACM2005 , New York City, New York, 2005.
"Extended Abstract: Formal Verification of Architectural Patterns in Support of Dependable Distributed Systems", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005.
"Extended Abstract: Organizing Automaton Specifications to Achieve Faithful Representation", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005.
"High-Power Proxies for Enhancing RFID Privacy and Utility", Privacy Enhancing Technologies Workshop (PET 2005), Cavtat, Croatia, 2005.
"Multiple Access Covert Channels", IASTED CNIS 2005, Phoenix, Arizona, 2005.
"Phase-signature based watermarking for multimedia authentication: Analysis and design", Multimedia Systems and Applications VIII, Boston, Massachusetts, 2005.
"Point/Counterpoint", IEEE Software, vol. 22, issue 1, pp. 48-51, 2005.
"The Pump: A Decade of Covert Fun", 21st Annual Computer Security Applications Conference, 2005.
"PVS Proof Strategies for Proving Abstraction Properties of Automata", Electronic Notes in Theoretical Computer Science, vol. 125, pp. 45-65, 2005.
"Security Ontology for Annotating Resources", 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05), Agia Napa, Cyprus, 2005.
"Tools for constructing requirements specifications: The SCR toolset at the age of ten", International Journal of Computer Systems Science and Engineering, vol. 20, issue 1, pp. 19-35, 2005.
"Visual Security Protocol Modeling", New Security Paradigms Workshop (NSPW), Lake Arrowhead, California, 2005.
"Anonymity and Covert Channels in Simple Timed Mix-firewalls", PET2004, Toronto, Canada, 2004.
"Basing a Modeling Environment on a General Purpose Theorem Prover", 2004 Monterey Workshop on Software Engineering Tools: Compatibility and Integration, Baden, Austria, 2004.
"The Binary Phase Only Filter as an Image Watermark", NRL CHACS Tech Memo, no. 5540-38TM, 2004.
"Correlation-Based Watermarking Method for Image Authentication Applications", Optical Engineering, vol. 43, issue 8, 2004.
"Covert Channels and Simple Timed Mix-firewalls", NRL Memorandum Report, 2004.
"Managing complexity in software development with formally based tools", ETAPS Workshop on Formal Foundations of Software and Component-Based Software Architectures (FESCA 2004), Barcelona, Spain, 2004.
"A New Framework for Shannon Information Theory", NRL Memorandum Report, no. NRL/MR/5540-04-8748, 2004.
"Phase signature-based umage authentication watermark robust to compression and coding", Mathematics of Data/Image Coding, Compression and Encrption VII, with Applications, pp. 133-144, 2004.
"Privacy-Preserving Collaborative Sequential Pattern Mining", Workshop on Link Analysis, Counter-terrorism and Privacy, 2004.
"Privacy-Preserving Naive Bayesian Classification", IASTED conference on AIA, Austria, 2004.
"Reusable PVS Proof Strategies for Proving Abstraction Properties of I/O Automata", Fourth International Workshop on Strategies in Automated Deduction (STRATEGIES 2004), Cork, Ireland, 2004.
"Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004.