Found 169 results
2002
Canetti, R., C. Meadows, and P. Syverson, "Environmental Requirements for Authentication Protocols", International Symposium on Software Security, vol. Springer-Verlag LNCS 2609, pp. 339-355, 2002.
Bharadwaj, R., "Formal Analysis of Domain Models", International Workshop on Requirements for High Assurance Systems (RHAS'02), Essen, Germany, 2002.
Serjantov, A., R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types", Information Hiding, vol. Springer-Verlag LNCS 2578, pp. 36-52, 2002.
Meadows, C., "Identifying Potential Type Confusion in Authenticated Messages", Workshop on Foundations of Computer Security, Copenhagen, Denmark, 2002.
Bharadwaj, R., J. Froscher, A. Khashnobish, and J. Tracy, "An Infrastructure for Secure Interoperability of Agents", Sixth World Multiconference on Systemics, Cybernetics, and Informatics, Orlando, Florida, 2002.
"Issues in Information Hiding Transform Techniques", NRL Memorandum Report, no. 5540-02-8621, 2002.
Chang, LW., and J. Tracy, "Multi-Dimensional Inference and Confidential Data Protection with Decision Tree Methods", ICDM02 Workshop: The Foundation of Data Mining and Knowledge Discovery, Maebashi, Japan, pp. 195-200, 2002.
Archer, M., "Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME", WITS '02, Portland, Oregon, 2002.
Archer, M., C. L. Heitmeyer, and E. Riccobene, "Proving Invariants of I/O Automata with TAME", Automated Software Engineering, vol. 9, pp. 201-232, 2002.
Dingledine, R., and P. Syverson, "Reliable MIX Cascade Networks through Reputation", Financial Cryptography 2002, 2002.
Dingledine, R., N. Mathewson, and P. Syverson, "Reputation in Privacy Enhancing Technologies", Computer, Freedom, and Privacy, 2002.
Kirby, Jr, J., "Rewriting Requirements for Design", IASTED International Conference on Software Engineering and Applications (SEA) 2002, Cambridge, Massachusetts , 2002.
Bharadwaj, R., "SINS: A middleware for autonomous agents and secure code mobility", Second International Workshop on Security of Mobile Multi-Agent Systems (SEMAS-02), First International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2002), Bologna, Italy, 2002.
Heitmeyer, C. L., and J. J. Marciniak, "Software Cost Reduction", Encyclopedia of Software Engineering, vol. 2, 2002.
Bharadwaj, R., "SOL: A Verifiable Synchronous Language for Reactive Systems", Synchronous Languages, Applications, and Programming (SLAP'02), ETAPS'2002, Grenoble, France, 2002.
Newman, R., I. S. Moskowitz, LW. Chang, and M. M. Brahmadesam, "A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis", Information Hiding, 2002.
Chang, LW., and I. S. Moskowitz, "A Study of Inference Problems in Distributed Databases", IFIP 11.3 WG in Data Security and Applications, Kings College, UK, 2002.
"Towards a Methodology and Tool for the Analysis of Security-Enhanced Linux Security Policies", NRL Memorandum Report, no. 5540--02-8629, 2002.
"A Unification Algorithm for the Group Diffie-Hellman Protocol", WITS '02, 2002.
Meadows, C., "Using a Declarative Language to Build an Experimental Analysis Tool", PADL '02, vol. Springer Verlag LNCS 2257, pp. 1-2, 2002.
"Verifiable Middleware for Secure Agent Interoperability", Second Goddard IEEE Workshop on Formal Approaches to Agent-Based Systems (FAABS II), Greenbelt, Maryland, 2002.
2001
Jeffords, R., and C. L. Heitmeyer, "An Algorithm for Strengthening State Invariants Generated from Requirements Specifications", Fifth IEEE Int'l Symp. on Requirements Engineering (RE'01), Toronto, Canada, 2001.
Heitmeyer, C. L., "Applying 'Practical' Formal Methods to the Specification and Analysis of Security Properties", Information Assurance in Computer Networks (MMM-ACNS 2001), St. Petersburg, Russia, 2001.
Chang, LW., and I. S. Moskowitz, "A Bayesian Network Schema for Lessoning Database Inference", International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas, Nevada, 2001.
Meadows, C., P. Syverson, and I. Cervesato, "Formalizing GDOI Group Key Management Requirements in NPATRL", 8th ACM Computer and Communications Security Conference - CCS'01: ACM Press, pp. 235-244, 2001.

Pages