Found 181 results
Overlier, L., and P. Syverson, "Valet Services: Improving Hidden Servers with a Personal Touch", Privacy Enhancing Technologies Workshop, 2006. OverlierSyverson2006.pdf (656.17 KB)
Luo, J., B. Montrose, and M. Kang, "An Approach for Semantic Query Processing with UDDI", Agents, Web Services and Ontologies Merging, Agia Napa, Cyprus, 2005. Luo etal2005.pdf (240.06 KB)
McDermott, J., "Attack-potential-based survivability modeling for high-consequence systems", 3rd International Information Assurance Workshop, College Park, Maryland, 2005. McDermott2005b.pdf (406.04 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Challenges in deploying low-latency anonymity", NRL CHACS, no. 5540-625, 2005. Dingledine etal2005.pdf (202.95 KB)
Ahmed, F., and I. S. Moskowitz, "Composite Signature Based Watermarking for Fingerprint Authentication", ACM Multimedia and Security Workshop, ACM2005 , New York City, New York, 2005. AhmedMoskowitz2005.pdf (486.33 KB)
Jeffords, R., and R. Bharadwaj, "Extended Abstract: Formal Verification of Architectural Patterns in Support of Dependable Distributed Systems", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005. JeffordsBharadwaj2005.pdf (59.54 KB)
Leonard, E., and M. Archer, "Extended Abstract: Organizing Automaton Specifications to Achieve Faithful Representation", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005. LeonardArcher2005.pdf (88.94 KB)
Juels, A., P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility", Privacy Enhancing Technologies Workshop (PET 2005), Cavtat, Croatia, 2005. Juels etal2005.pdf (125.29 KB)
Moskowitz, I. S., and R. Newman, "Multiple Access Covert Channels", IASTED CNIS 2005, Phoenix, Arizona, 2005. MoskowitzNewman2005.pdf (2.33 MB)
"Phase-signature based watermarking for multimedia authentication: Analysis and design", Multimedia Systems and Applications VIII, Boston, Massachusetts, 2005.
"Point/Counterpoint", IEEE Software, vol. 22, issue 1, pp. 48-51, 2005.
Kang, M., I. S. Moskowitz, and S. Chincheck, "The Pump: A Decade of Covert Fun", 21st Annual Computer Security Applications Conference, 2005. Kang etal 2005.pdf (535.23 KB)
Mitra, S., and M. Archer, "PVS Proof Strategies for Proving Abstraction Properties of Automata", Electronic Notes in Theoretical Computer Science, vol. 125, pp. 45-65, 2005. MitraArcher2005.pdf (486.64 KB)
Kim, A., J. Luo, and M. Kang, "Security Ontology for Annotating Resources", 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05), Agia Napa, Cyprus, 2005. Kim etal2005.pdf (249.7 KB)
Heitmeyer, C. L., M. Archer, R. Bharadwaj, and R. Jeffords, "Tools for constructing requirements specifications: The SCR toolset at the age of ten", International Journal of Computer Systems Science and Engineering, vol. 20, issue 1, pp. 19-35, 2005. Heitmeyer etal2005.pdf (774.15 KB)
McDermott, J., "Visual Security Protocol Modeling", New Security Paradigms Workshop (NSPW), Lake Arrowhead, California, 2005. McDermott2005.pdf (414.47 KB)
Newman, R., V. R. Nalla, and I. S. Moskowitz, "Anonymity and Covert Channels in Simple Timed Mix-firewalls", PET2004, Toronto, Canada, 2004. Newman etal2004.pdf (312.75 KB)
Archer, M., "Basing a Modeling Environment on a General Purpose Theorem Prover", 2004 Monterey Workshop on Software Engineering Tools: Compatibility and Integration, Baden, Austria, 2004. Archer2004.pdf (10.51 MB)
Ahmed, F., and I. S. Moskowitz, "The Binary Phase Only Filter as an Image Watermark", NRL CHACS Tech Memo, no. 5540-38TM, 2004. AhmedMoskowitz2004b.pdf (192.31 KB)
Ahmed, F., and I. S. Moskowitz, "Correlation-Based Watermarking Method for Image Authentication Applications", Optical Engineering, vol. 43, issue 8, 2004. AhmedMoskowitz2004.pdf (424.74 KB)
"Covert Channels and Simple Timed Mix-firewalls", NRL Memorandum Report, 2004.
Miller, A. R., and I. S. Moskowitz, Difference of Sums Containing Products of Binomial Coefficients and their Logarithms, , 2004. MillerMoskowitz2004.pdf (671.78 KB)
Heitmeyer, C. L., "Managing complexity in software development with formally based tools", ETAPS Workshop on Formal Foundations of Software and Component-Based Software Architectures (FESCA 2004), Barcelona, Spain, 2004. Heitmeyer2004.pdf (175.67 KB)
"A New Framework for Shannon Information Theory", NRL Memorandum Report, no. NRL/MR/5540-04-8748, 2004.
"Phase signature-based umage authentication watermark robust to compression and coding", Mathematics of Data/Image Coding, Compression and Encrption VII, with Applications, pp. 133-144, 2004.