2006 |
35 | | Ira S. Moskowitz,
Richard E. Newman:
Timing channels, anonymity, mixes, and spikes.
ACST 2006: 252-256 |
34 | EE | Keye Martin,
Ira S. Moskowitz:
Noisy Timing Channels with Binary Inputs and Outputs.
Information Hiding 2006: 124-144 |
33 | EE | Keye Martin,
Ira S. Moskowitz,
Gerard Allwein:
Algebraic Information Theory For Binary Channels.
Electr. Notes Theor. Comput. Sci. 158: 289-306 (2006) |
2005 |
32 | EE | Myong H. Kang,
Ira S. Moskowitz,
Stanley Chincheck:
The Pump: A Decade of Covert Fun.
ACSAC 2005: 352-360 |
31 | EE | Farid Ahmed,
Ira S. Moskowitz:
Composite signature based watermarking for fingerprint authentication.
MM&Sec 2005: 137-142 |
2004 |
30 | EE | Richard E. Newman,
Vipan R. Nalla,
Ira S. Moskowitz:
Anonymity and Covert Channels in Simple Timed Mix-Firewalls.
Privacy Enhancing Technologies 2004: 1-16 |
2003 |
29 | EE | Richard E. Newman,
Ira S. Moskowitz,
Paul F. Syverson,
Andrei Serjantov:
Metrics for Trafic Analysis Prevention.
Privacy Enhancing Technologies 2003: 48-65 |
28 | EE | Ira S. Moskowitz,
Richard E. Newman,
Daniel P. Crepeau,
Allen R. Miller:
Covert channels and anonymizing networks.
WPES 2003: 79-88 |
27 | EE | James Tracy,
LiWu Chang,
Ira S. Moskowitz:
An Agent-Based Approach to Inference Prevention in Distributed Database Systems.
International Journal on Artificial Intelligence Tools 12(3): 297-313 (2003) |
2002 |
26 | | LiWu Chang,
Ira S. Moskowitz:
A Study of Inference Problems in Distributed Databases.
DBSec 2002: 191-204 |
25 | EE | James Tracy,
LiWu Chang,
Ira S. Moskowitz:
An Agent-Based Approach to Inference Prevention in Distributed Database Systems.
ICTAI 2002: 413- |
24 | EE | Richard E. Newman,
Ira S. Moskowitz,
LiWu Chang,
Murali M. Brahmadesam:
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis.
Information Hiding 2002: 258-277 |
2001 |
23 | | Ira S. Moskowitz:
Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings
Springer 2001 |
22 | | Ira S. Moskowitz,
Myong H. Kang,
LiWu Chang,
Garth E. Longdon:
Randomly roving agents for intrusion detection.
DBSec 2001: 135-149 |
2000 |
21 | | LiWu Chang,
Ira S. Moskowitz:
An Integrated Framework for Database Privacy Protection.
DBSec 2000: 161-172 |
1999 |
20 | | Myong H. Kang,
Judith N. Froscher,
Brian J. Eppinger,
Ira S. Moskowitz:
A Strategy for an MLS Workflow Management System.
DBSec 1999: 161-174 |
19 | | Ira S. Moskowitz,
LiWu Chang:
An Entropy-Based Framework for Database Inference.
Information Hiding 1999: 405-418 |
1998 |
18 | | LiWu Chang,
Ira S. Moskowitz:
Bayesian Methods to the Database Inference Problem.
DBSec 1998: 237-251 |
17 | EE | LiWu Chang,
Ira S. Moskowitz:
Parsimonious Downgrading and Decision Trees Applied to the Inference Problem.
Workshop on New Security Paradigms 1998: 82-89 |
16 | | Myong H. Kang,
Andrew P. Moore,
Ira S. Moskowitz:
Design and Assurance Strategy for the NRL Pump.
IEEE Computer 31(4): 56-64 (1998) |
15 | | Ira S. Moskowitz,
Steven J. Greenwald,
Myong H. Kang:
An Analysis of the Timed Z-Channel.
IEEE Transactions on Information Theory 44(7): 3162-3168 (1998) |
1997 |
14 | EE | Myong H. Kang,
Judith N. Froscher,
Ira S. Moskowitz:
An Architecture for Multilevel Secure Interoperability.
ACSAC 1997: 194-204 |
13 | | LiWu Chang,
Ira S. Moskowitz:
Critical analysis of security in voice hiding techniques.
ICICS 1997: 203-216 |
1996 |
12 | EE | Myong H. Kang,
Ira S. Moskowitz,
Bruce E. Montrose,
James J. Parsonese:
A Case Study Of Two Nrl Pump Prototypes.
ACSAC 1996: 32-43 |
11 | EE | Myong H. Kang,
Judith N. Froscher,
Ira S. Moskowitz:
A framework for MLS interoperability.
HASE 1996: 198-205 |
10 | EE | Ira S. Moskowitz,
Steven J. Greenwald,
Myong H. Kang:
An Analysis of the Timed Z-channel.
IEEE Symposium on Security and Privacy 1996: 2-11 |
9 | | Catherine Meadows,
Ira S. Moskowitz:
Covert Channels - A Context-Based View.
Information Hiding 1996: 73-93 |
8 | EE | Myong H. Kang,
Ira S. Moskowitz,
Daniel C. Lee:
A Network Pump.
IEEE Trans. Software Eng. 22(5): 329-338 (1996) |
1995 |
7 | | Ira S. Moskowitz,
Myong H. Kang:
The Modulated-Input Modulated-Output Model.
DBSec 1995: 61-75 |
1993 |
6 | EE | Myong H. Kang,
Ira S. Moskowitz:
A Pump for Rapid, Reliable, Secure Communication.
ACM Conference on Computer and Communications Security 1993: 119-129 |
1992 |
5 | | Ira S. Moskowitz,
Oliver Costich:
A classical Automata Approach to Noninterference Type Problems.
CSFW 1992: 2-8 |
4 | | Ira S. Moskowitz,
Allen R. Miller:
The channel capacity of a certain noisy timing channel.
IEEE Transactions on Information Theory 38(4): 1339- (1992) |
1991 |
3 | | Oliver Costich,
Ira S. Moskowitz:
Analysis of a Storage Channel in the Two-Phase Commit Protocol.
CSFW 1991: 201-208 |
2 | | Ira S. Moskowitz:
Variable Noise Effects Upon a Simple Timing Channel.
IEEE Symposium on Security and Privacy 1991: 362-372 |
1990 |
1 | | Ira S. Moskowitz:
Quotient States and Probabilistic Channels.
CSFW 1990: 74-83 |