A pump for rapid, reliable, secure communication MH Kang, IS Moskowitz Proceedings of the 1st ACM Conference on Computer and Communications …, 1993 | 223 | 1993 |
Covert channels-here to stay? IS Moskowitz, MH Kang Proceedings of COMPASS'94-1994 IEEE 9th Annual Conference on Computer …, 1994 | 216 | 1994 |
A network pump MH Kang, IS Moskowitz, DC Lee IEEE Transactions on Software Engineering 22 (5), 329-338, 1996 | 155 | 1996 |
Covert channels and anonymizing networks IS Moskowitz, RE Newman, DP Crepeau, AR Miller Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 79-88, 2003 | 121 | 2003 |
Correlation-based watermarking method for image authentication applications F Ahmed, IS Moskowitz Optical Engineering 43 (8), 1833-1838, 2004 | 115 | 2004 |
The pump: A decade of covert fun MH Kang, IS Moskowitz, S Chincheck 21st Annual Computer Security Applications Conference (ACSAC'05), 7 pp.-360, 2005 | 105 | 2005 |
Simple timing channels IS Moskowitz, AR Miller Proceedings of 1994 IEEE Computer Society Symposium on Research in Security …, 1994 | 100 | 1994 |
Parsimonious downgrading and decision trees applied to the inference problem LW Chang, IS Moskowitz Proceedings of the 1998 workshop on New security paradigms, 82-89, 1998 | 94 | 1998 |
The channel capacity of a certain noisy timing channel IS Moskowitz, AR Miller IEEE Transactions on Information Theory 38 (4), 1339-1344, 1992 | 87 | 1992 |
A new paradigm hidden in steganography IS Moskowitz, GE Longdon, LW Chang Proceedings of the 2000 workshop on New Security Paradigms, 41-50, 2001 | 80 | 2001 |
Quasi-anonymous channels IS Moskowitz, RE Newman, PF Syverson IASTED CNIS, 126-131, 2003 | 78 | 2003 |
A network version of the pump MH Kang, IS Moskowitz, DC Lee Proceedings 1995 IEEE Symposium on Security and Privacy, 144-154, 1995 | 69 | 1995 |
An integrated framework for database privacy protection LW Chang, IS Moskowitz Data and Application Security: Developments and Directions, 161-172, 2001 | 66 | 2001 |
Design and assurance strategy for the NRL pump MH Kang, AP Moore, IS Moskowitz Proceedings 1997 High-Assurance Engineering Workshop, 64-71, 1997 | 66 | 1997 |
Metrics for traffic analysis prevention RE Newman, IS Moskowitz, P Syverson, A Serjantov International Workshop on Privacy Enhancing Technologies, 48-65, 2003 | 64 | 2003 |
Systems and methods for providing increased computer security S Chincheck, MH Kang, IS Moskowitz, J Parsonese US Patent 7,149,897, 2006 | 60 | 2006 |
An analysis of the timed Z-channel IS Moskowitz, SJ Greenwald, MH Kang Proceedings 1996 IEEE Symposium on Security and Privacy, 2-11, 1996 | 60 | 1996 |
Composite signature based watermarking for fingerprint authentication F Ahmed, IS Moskowitz Proceedings of the 7th workshop on Multimedia and security, 137-142, 2005 | 50 | 2005 |
An insecurity flow model IS Moskowitz, MH Kang Proceedings of the 1997 workshop on New security paradigms, 61-74, 1998 | 46 | 1998 |
Capacity is the wrong paradigm IS Moskowitz, LW Chang, RE Newman Proceedings of the 2002 workshop on New security paradigms, 114-126, 2002 | 44 | 2002 |