Found 180 results
2003
Leonard, E., and C. L. Heitmeyer, "Program Synthesis from Formal Requirements Specifications using APTS", Higher-Order and Symbolic Computation, vol. 16, issue 1-2, pp. 63-92, 2003. LeonardHeitmeyer2003.pdf (164.15 KB)
Moskowitz, I. S., R. Newman, and P. Syverson, "Quasi-Anonymous Channels", CNIS 2003, New York City, New York, 2003. Moskowitz etal2003.pdf (60.86 KB)
Bharadwaj, R., "Secure Middleware for Situation-Aware Naval C2 and Combat Systems", 9th International Workshop on Future Trends of Distributed Comput ing Systems (FTDCS 2003), San Juan, Puerto Rico, 2003. Bharadwaj2003.pdf (169.53 KB)
Chang, LW., "Statistical Sensitive Data Protection And Inference Prevention with Decision Tree Methods", Joint Statistical Meeting 2003, 2003. Chang2003.pdf (119.01 KB)
Jeffords, R., and C. L. Heitmeyer, "A Strategy for Efficiently Verifying Requirements Specifications Using Composition and Invariants", European Software Engineering Conference/ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE 2003), Helsinki, Finland, 2003. JeffordsHeitmeyer2003.pdf (211.53 KB)
Meadows, C., "Towards a Hierarchy of Cryptographic Protocol Models", FMSE 2003: Formal Methods in Security Engineering: ACM Press, 2003. Meadows2003.pdf (49.02 KB)
Bharadwaj, R., "Verifiable Middleware for Secure Agent Interoperability", 2nd Goddard IEEE Workshop on Formal Approaches to Agent-Based Systems, Greenbelt, Maryland, 2003. Bharadwaj2003d.pdf (183.81 KB)
Meadows, C., "What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis", ESOP 03, 2003. Meadows2003b.pdf (168.07 KB)
2002
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", 14th IEEE International Conference on Tools with Artificial Intelligence, Washington, D.C., pp. 413-422, 2002. Tracy etal2002.pdf (220.93 KB)
Moskowitz, I. S., LW. Chang, and R. Newman, "Capacity is the Wrong Paradigm", New Security Paradigms Workshop (NSPW), Virginia Beach, Virginia, 2002. Moskowitz etal2002b.pdf (247.04 KB)
Moskowitz, I. S., N. F. Johnson, and M. Jacobs, "A Detection Study of an NRL Steganographic Method", NRL Memorandum Report, no. NRL/MR/554002-8635, 2002. Moskowitz etal2002.pdf (14.22 MB)
Canetti, R., C. Meadows, and P. Syverson, "Environmental Requirements for Authentication Protocols", International Symposium on Software Security, vol. Springer-Verlag LNCS 2609, pp. 339-355, 2002. Canetti etal2002.pdf (186.26 KB)
Bharadwaj, R., "Formal Analysis of Domain Models", International Workshop on Requirements for High Assurance Systems (RHAS'02), Essen, Germany, 2002. Bharadwaj2002.pdf (200.72 KB)
Serjantov, A., R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types", Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002. Serjantov etal2002.pdf (222.02 KB)
Meadows, C., "Identifying Potential Type Confusion in Authenticated Messages", Workshop on Foundations of Computer Security, Copenhagen, Denmark, 2002. Meadows2002b.pdf (125.64 KB)
Bharadwaj, R., J. Froscher, A. Khashnobish, and J. Tracy, "An Infrastructure for Secure Interoperability of Agents", Sixth World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, 2002. Bharadwaj etal2002.pdf (32.11 KB)
"Issues in Information Hiding Transform Techniques", NRL Memorandum Report, no. 5540-02-8621, 2002.
Chang, LW., and J. Tracy, "Multi-Dimensional Inference and Confidential Data Protection with Decision Tree Methods", ICDM02 Workshop: The Foundation of Data Mining and Knowledge Discovery, Maebashi, Japan, pp. 195-200, 2002. ChangTracy2002.pdf (204 KB)
Archer, M., "Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME", WITS '02, Portland, Oregon, 2002. Archer2002.pdf (191.65 KB)
Archer, M., C. L. Heitmeyer, and E. Riccobene, "Proving Invariants of I/O Automata with TAME", Automated Software Engineering, vol. 9, pp. 201-232, 2002. Archer etal2002.pdf (355.28 KB)
Dingledine, R., and P. Syverson, "Reliable MIX Cascade Networks through Reputation", Financial Cryptography 2002, 2002. DingledineSyverson2002.pdf (210 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Reputation in Privacy Enhancing Technologies", Computer, Freedom, and Privacy, 2002. Dingledine etal2002.pdf (25.17 KB)
Kirby, Jr, J., "Rewriting Requirements for Design", IASTED International Conference on Software Engineering and Applications (SEA) 2002, Cambridge, Massachusetts , 2002. Kirby2002.pdf (274.15 KB)
Bharadwaj, R., "SINS: A middleware for autonomous agents and secure code mobility", Second International Workshop on Security of Mobile Multi-Agent Systems (SEMAS-02), First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2002), Bologna, Italy, 2002. Bharadwaj2002b.pdf (119.17 KB)
Heitmeyer, C. L., and J. J. Marciniak, "Software Cost Reduction", Encyclopedia of Software Engineering, vol. 2, 2002. Heitmeyer2002.pdf (220.45 KB)

Pages