Found 183 results
"Specifying and Proving Properties of Timed I/O Automata in the TIOA Toolkit", Fourth ACM \& IEEE International Conference on Formal Methods and Models for Co-Design, Napa, California, pp. 129-138, 2006.
"Translation Templates to Support Strategy Development in PVS", STRATEGIES06, The Sixth International Workshop on Strategies in Automated Deduction, Seattle, Washington, 2006.
"Valet Services: Improving Hidden Servers with a Personal Touch", Privacy Enhancing Technologies Workshop, 2006.
"An Approach for Semantic Query Processing with UDDI", Agents, Web Services and Ontologies Merging, Agia Napa, Cyprus, 2005.
"Attack-potential-based survivability modeling for high-consequence systems", 3rd International Information Assurance Workshop, College Park, Maryland, 2005.
"Challenges in deploying low-latency anonymity", NRL CHACS, no. 5540-625, 2005.
"Composite Signature Based Watermarking for Fingerprint Authentication", ACM Multimedia and Security Workshop, ACM2005 , New York City, New York, 2005.
"Extended Abstract: Formal Verification of Architectural Patterns in Support of Dependable Distributed Systems", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005.
"Extended Abstract: Organizing Automaton Specifications to Achieve Faithful Representation", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005.
"High-Power Proxies for Enhancing RFID Privacy and Utility", Privacy Enhancing Technologies Workshop (PET 2005), Cavtat, Croatia, 2005.
"Multiple Access Covert Channels", IASTED CNIS 2005, Phoenix, Arizona, 2005.
"Phase-signature based watermarking for multimedia authentication: Analysis and design", Multimedia Systems and Applications VIII, Boston, Massachusetts, 2005.
"Point/Counterpoint", IEEE Software, vol. 22, issue 1, pp. 48-51, 2005.
"The Pump: A Decade of Covert Fun", 21st Annual Computer Security Applications Conference, 2005.
"PVS Proof Strategies for Proving Abstraction Properties of Automata", Electronic Notes in Theoretical Computer Science, vol. 125, pp. 45-65, 2005.
"Security Ontology for Annotating Resources", 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05), Agia Napa, Cyprus, 2005.
"Tools for constructing requirements specifications: The SCR toolset at the age of ten", International Journal of Computer Systems Science and Engineering, vol. 20, issue 1, pp. 19-35, 2005.
"Visual Security Protocol Modeling", New Security Paradigms Workshop (NSPW), Lake Arrowhead, California, 2005.
"Anonymity and Covert Channels in Simple Timed Mix-firewalls", PET2004, Toronto, Canada, 2004.
"Basing a Modeling Environment on a General Purpose Theorem Prover", 2004 Monterey Workshop on Software Engineering Tools: Compatibility and Integration, Baden, Austria, 2004.
"The Binary Phase Only Filter as an Image Watermark", NRL CHACS Tech Memo, no. 5540-38TM, 2004.
"Correlation-Based Watermarking Method for Image Authentication Applications", Optical Engineering, vol. 43, issue 8, 2004.
"Covert Channels and Simple Timed Mix-firewalls", NRL Memorandum Report, 2004.
"Managing complexity in software development with formally based tools", ETAPS Workshop on Formal Foundations of Software and Component-Based Software Architectures (FESCA 2004), Barcelona, Spain, 2004.