Found 190 results
"Anonymity and Covert Channels in Simple Timed Mix-firewalls", PET2004, Toronto, Canada, 2004.
"Basing a Modeling Environment on a General Purpose Theorem Prover", 2004 Monterey Workshop on Software Engineering Tools: Compatibility and Integration, Baden, Austria, 2004.
"The Binary Phase Only Filter as an Image Watermark", NRL CHACS Tech Memo, no. 5540-38TM, 2004.
"Correlation-Based Watermarking Method for Image Authentication Applications", Optical Engineering, vol. 43, issue 8, 2004.
"Covert Channels and Simple Timed Mix-firewalls", NRL Memorandum Report, 2004.
"Managing complexity in software development with formally based tools", ETAPS Workshop on Formal Foundations of Software and Component-Based Software Architectures (FESCA 2004), Barcelona, Spain, 2004.
"A New Framework for Shannon Information Theory", NRL Memorandum Report, no. NRL/MR/5540-04-8748, 2004.
"Phase signature-based umage authentication watermark robust to compression and coding", Mathematics of Data/Image Coding, Compression and Encrption VII, with Applications, pp. 133-144, 2004.
"Privacy-Preserving Collaborative Sequential Pattern Mining", Workshop on Link Analysis, Counter-terrorism and Privacy, 2004.
"Privacy-Preserving Naive Bayesian Classification", IASTED conference on AIA, Austria, 2004.
"Reusable PVS Proof Strategies for Proving Abstraction Properties of I/O Automata", Fourth International Workshop on Strategies in Automated Deduction (STRATEGIES 2004), Cork, Ireland, 2004.
"Synchronous Batching: From Cascades to Free Routes", Privacy Enhancing Technologies workshop (PET 2004), 2004.
"Tor: The Second-Generation Onion Router", 13th USENIX Security Symposium, 2004.
"Using Invariants to Optimize Formal Specifications Before Code Synthesis", 2nd ACM/IEEE Int'l Conf. on Formal Methods and Models for Co-Design (MEMOCODE 2004), San Diego, California, 2004.
"What Price Privacy? (and why identity theft is about neither identity nor theft)", Economics of Information Security: Kluwer Academic Publishers, pp. 129-142, 2004.
"An Agent-based Approach to Inference Prevention in Distributed Database Systems", International Journal on Artificial Intelligence Tools, vol. 12, issue 3, pp. 297-314, 2003.
"Analyzing Security-Enhanced Linux Policy Specifications", NRL Memorandum Report, no. MR-8659, 2003.
"Analyzing Security-Enhanced Linux Policy Specifications", IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, 2003.
"Covert Channels and Anonymizing Networks", WPES'03, Washington, D.C., 2003.
"A Detailed Mathematical Analysis of a Class of Covert Channels Arising in Certain Anonymizing Networks", NRL Memorandum Report, no. NRL/MR/5540--03-8691, 2003.
"Developing Strategies for Specialized Theorem Proving about Untimed, Timed, and Hybrid I/O Automata", First International Workshop on Design and Application of Strategies/Tactics in Higher Order Logics (STRATA 2003), Rome, Italy, 2003.
"Developing User Strategies in PVS: A Tutorial", First International Workshop on Design and Application of Strategies/Tactics in Higher Order Logics (STRATA 2003), Rome, Italy, 2003.
"An Extended Framework for the Validation and Verification of Situation-Aware Middleware Architectures", Proceedings Ground System Architectures Workshop (GSAW 2003), Manhattan Beach, California, 2003.
"A Fault Tree Representation of NPATRL Security Requirements", Workshop on Issues in Theory of Security 2003, 2003.