Search the dblp DataBase
Ira S. Moskowitz :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Myong H. Kang , Ira S. Moskowitz A Pump for Rapid, Reliable, Secure Communication. [Citation Graph (1, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:119-129 [Conf ] Myong H. Kang , Judith N. Froscher , Ira S. Moskowitz An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:194-204 [Conf ] Myong H. Kang , Ira S. Moskowitz , Stanley Chincheck The Pump: A Decade of Covert Fun. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:352-360 [Conf ] Myong H. Kang , Ira S. Moskowitz , Bruce E. Montrose , James J. Parsonese A Case Study Of Two Nrl Pump Prototypes. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:32-43 [Conf ] Oliver Costich , Ira S. Moskowitz Analysis of a Storage Channel in the Two-Phase Commit Protocol. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:201-208 [Conf ] Ira S. Moskowitz Quotient States and Probabilistic Channels. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:74-83 [Conf ] Ira S. Moskowitz , Oliver Costich A classical Automata Approach to Noninterference Type Problems. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:2-8 [Conf ] LiWu Chang , Ira S. Moskowitz An Integrated Framework for Database Privacy Protection. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:161-172 [Conf ] LiWu Chang , Ira S. Moskowitz A Study of Inference Problems in Distributed Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:191-204 [Conf ] LiWu Chang , Ira S. Moskowitz Bayesian Methods to the Database Inference Problem. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:237-251 [Conf ] Myong H. Kang , Judith N. Froscher , Brian J. Eppinger , Ira S. Moskowitz A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:161-174 [Conf ] Ira S. Moskowitz , Myong H. Kang The Modulated-Input Modulated-Output Model. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:61-75 [Conf ] Ira S. Moskowitz , Myong H. Kang , LiWu Chang , Garth E. Longdon Randomly roving agents for intrusion detection. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:135-149 [Conf ] Myong H. Kang , Judith N. Froscher , Ira S. Moskowitz A framework for MLS interoperability. [Citation Graph (0, 0)][DBLP ] HASE, 1996, pp:198-205 [Conf ] LiWu Chang , Ira S. Moskowitz Critical analysis of security in voice hiding techniques. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:203-216 [Conf ] James Tracy , LiWu Chang , Ira S. Moskowitz An Agent-Based Approach to Inference Prevention in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] ICTAI, 2002, pp:413-0 [Conf ] Ira S. Moskowitz , LiWu Chang An Entropy-Based Framework for Database Inference. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:405-418 [Conf ] Catherine Meadows , Ira S. Moskowitz Covert Channels - A Context-Based View. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1996, pp:73-93 [Conf ] Richard E. Newman , Ira S. Moskowitz , LiWu Chang , Murali M. Brahmadesam A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2002, pp:258-277 [Conf ] LiWu Chang , Ira S. Moskowitz Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. [Citation Graph (0, 0)][DBLP ] Workshop on New Security Paradigms, 1998, pp:82-89 [Conf ] Richard E. Newman , Ira S. Moskowitz , Paul F. Syverson , Andrei Serjantov Metrics for Trafic Analysis Prevention. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2003, pp:48-65 [Conf ] Richard E. Newman , Vipan R. Nalla , Ira S. Moskowitz Anonymity and Covert Channels in Simple Timed Mix-Firewalls. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2004, pp:1-16 [Conf ] Ira S. Moskowitz Variable Noise Effects Upon a Simple Timing Channel. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:362-372 [Conf ] Ira S. Moskowitz , Steven J. Greenwald , Myong H. Kang An Analysis of the Timed Z-channel. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:2-11 [Conf ] Ira S. Moskowitz , Richard E. Newman , Daniel P. Crepeau , Allen R. Miller Covert channels and anonymizing networks. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:79-88 [Conf ] Ira S. Moskowitz , Richard E. Newman Timing channels, anonymity, mixes, and spikes. [Citation Graph (0, 0)][DBLP ] ACST, 2006, pp:252-256 [Conf ] Myong H. Kang , Andrew P. Moore , Ira S. Moskowitz Design and Assurance Strategy for the NRL Pump. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:4, pp:56-64 [Journal ] Keye Martin , Ira S. Moskowitz , Gerard Allwein Algebraic Information Theory For Binary Channels. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:158, n:, pp:289-306 [Journal ] James Tracy , LiWu Chang , Ira S. Moskowitz An Agent-Based Approach to Inference Prevention in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] International Journal on Artificial Intelligence Tools, 2003, v:12, n:3, pp:297-313 [Journal ] Ira S. Moskowitz , Steven J. Greenwald , Myong H. Kang An Analysis of the Timed Z-Channel. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3162-3168 [Journal ] Ira S. Moskowitz , Allen R. Miller The channel capacity of a certain noisy timing channel. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1992, v:38, n:4, pp:1339-0 [Journal ] Myong H. Kang , Ira S. Moskowitz , Daniel C. Lee A Network Pump. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1996, v:22, n:5, pp:329-338 [Journal ] Keye Martin , Ira S. Moskowitz Noisy Timing Channels with Binary Inputs and Outputs. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2006, pp:124-144 [Conf ] Farid Ahmed , Ira S. Moskowitz Composite signature based watermarking for fingerprint authentication. [Citation Graph (0, 0)][DBLP ] MM&Sec, 2005, pp:137-142 [Conf ] Search in 0.007secs, Finished in 0.009secs