Found 189 results
Archer, M., and E. Leonard, "Establishing High Confidence in Code Implementations of Algorithms using Formal Verification of Pseudocode", Proceedings of VERIFY'06, The Third International Verification Workshop, Seattle, Washington, 2006. PDF icon ArcherLeonard2006.pdf (2.14 MB)
Heitmeyer, C. L., M. Archer, E. Leonard, and J. McLean, "Formal specification and verification of data separation in a separation kernel for an embedded system", 13th ACM Conference on Computer and Communications Security (CCS 2006), Alexandria, Virginia, pp. 346-355, 2006. PDF icon Heitmeyer etal2006.pdf (265.8 KB)
Rothamel, T., Y. A. Liu, C. L. Heitmeyer, and E. Leonard, "Generating Optimized Code from SCR Specifications", ACM SIGPLAN/SIGBED Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES 2006), Ottawa, Canada, 2006. PDF icon Rothamel etal2006.pdf (159.88 KB)
Overlier, L., and P. Syverson, "Locating Hidden Servers", IEEE Symposium on Security and Privacy, Oakland, California, IEEE Computer Society Press, 2006. PDF icon OverlierSyverson2006b.pdf (852.47 KB)
Kirby, Jr, J., "Model-Driven Agile Development of Reactive Multi-Agent Systems", 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), Chicago, Illinois, 2006. PDF icon Kirby2006.pdf (319.81 KB)
"A semi-reversible watermark for medical image authentication", 1st Transdisciplinary Conference on Distributed Diagnosis and Home Healthcare, D2H2 2006, Arlington, Virginia, pp. 59-62, 2006.
Archer, M., HP. Lim, N. Lynch, S. Mitra, and S. Umeno, "Specifying and Proving Properties of Timed I/O Automata in the TIOA Toolkit", Fourth ACM \& IEEE International Conference on Formal Methods and Models for Co-Design, Napa, California, pp. 129-138, 2006. PDF icon Archer etal2006.pdf (101.11 KB)
Lim, HP., and M. Archer, "Translation Templates to Support Strategy Development in PVS", STRATEGIES06, The Sixth International Workshop on Strategies in Automated Deduction, Seattle, Washington, 2006. PDF icon LimArcher2006.pdf (2.52 MB)
Overlier, L., and P. Syverson, "Valet Services: Improving Hidden Servers with a Personal Touch", Privacy Enhancing Technologies Workshop, 2006. PDF icon OverlierSyverson2006.pdf (656.17 KB)
Luo, J., B. Montrose, and M. Kang, "An Approach for Semantic Query Processing with UDDI", Agents, Web Services and Ontologies Merging, Agia Napa, Cyprus, 2005. PDF icon Luo etal2005.pdf (240.06 KB)
McDermott, J., "Attack-potential-based survivability modeling for high-consequence systems", 3rd International Information Assurance Workshop, College Park, Maryland, 2005. PDF icon McDermott2005b.pdf (406.04 KB)
Dingledine, R., N. Mathewson, and P. Syverson, "Challenges in deploying low-latency anonymity", NRL CHACS, no. 5540-625, 2005. PDF icon Dingledine etal2005.pdf (202.95 KB)
Ahmed, F., and I. S. Moskowitz, "Composite Signature Based Watermarking for Fingerprint Authentication", ACM Multimedia and Security Workshop, ACM2005 , New York City, New York, 2005. PDF icon AhmedMoskowitz2005.pdf (486.33 KB)
Jeffords, R., and R. Bharadwaj, "Extended Abstract: Formal Verification of Architectural Patterns in Support of Dependable Distributed Systems", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005. PDF icon JeffordsBharadwaj2005.pdf (59.54 KB)
Leonard, E., and M. Archer, "Extended Abstract: Organizing Automaton Specifications to Achieve Faithful Representation", Third ACM-IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE'05), Verona, Italy, 2005. PDF icon LeonardArcher2005.pdf (88.94 KB)
Juels, A., P. Syverson, and D. Bailey, "High-Power Proxies for Enhancing RFID Privacy and Utility", Privacy Enhancing Technologies Workshop (PET 2005), Cavtat, Croatia, 2005. PDF icon Juels etal2005.pdf (125.29 KB)
Moskowitz, I. S., and R. Newman, "Multiple Access Covert Channels", IASTED CNIS 2005, Phoenix, Arizona, 2005. PDF icon MoskowitzNewman2005.pdf (2.33 MB)
"Phase-signature based watermarking for multimedia authentication: Analysis and design", Multimedia Systems and Applications VIII, Boston, Massachusetts, 2005.
"Point/Counterpoint", IEEE Software, vol. 22, issue 1, pp. 48-51, 2005.
Kang, M., I. S. Moskowitz, and S. Chincheck, "The Pump: A Decade of Covert Fun", 21st Annual Computer Security Applications Conference, 2005. PDF icon Kang etal 2005.pdf (535.23 KB)
Mitra, S., and M. Archer, "PVS Proof Strategies for Proving Abstraction Properties of Automata", Electronic Notes in Theoretical Computer Science, vol. 125, pp. 45-65, 2005. PDF icon MitraArcher2005.pdf (486.64 KB)
Kim, A., J. Luo, and M. Kang, "Security Ontology for Annotating Resources", 4th International Conference on Ontologies, Databases, and Applications of Semantics (ODBASE'05), Agia Napa, Cyprus, 2005. PDF icon Kim etal2005.pdf (249.7 KB)
Heitmeyer, C. L., M. Archer, R. Bharadwaj, and R. Jeffords, "Tools for constructing requirements specifications: The SCR toolset at the age of ten", International Journal of Computer Systems Science and Engineering, vol. 20, issue 1, pp. 19-35, 2005. PDF icon Heitmeyer etal2005.pdf (774.15 KB)
McDermott, J., "Visual Security Protocol Modeling", New Security Paradigms Workshop (NSPW), Lake Arrowhead, California, 2005. PDF icon McDermott2005.pdf (414.47 KB)