Search Results - "Guttman, Joshua"
-
1
State and Progress in Strand Spaces: Proving Fair Exchange
Published in Journal of automated reasoning (01-02-2012)“…Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols, for instance, coordinate delivery of new values to…”
Get full text
Journal Article -
2
How many is enough? Measuring the number of FAST exams needed by emergency medicine trainees to reach competence
Published in International journal of emergency medicine (04-11-2024)“…Background For patients with blunt abdominal trauma, the Focused Assessment with Sonography in Trauma (FAST) exam is the initial imaging modality employed to…”
Get full text
Journal Article -
3
Use of Point-of-Care Ultrasound for the Diagnosis of Ovarian Hyperstimulation Syndrome
Published in The Journal of emergency medicine (01-04-2017)“…Abstract Background Ovarian hyperstimulation syndrome (OHSS) occurs when ovaries are overstimulated and enlarged due to fertility treatments resulting in a…”
Get full text
Journal Article -
4
Measuring protocol strength with security goals
Published in International journal of information security (01-11-2016)“…Flaws in published standards for security protocols are found regularly, often after systems implementing those standards have been deployed. Because of…”
Get full text
Journal Article -
5
Localizing Firewall Security Policies
Published in 2016 IEEE 29th Computer Security Foundations Symposium (CSF) (01-06-2016)“…In complex networks, filters may be applied at different nodes to control how packets flow. In this paper, we study how to locate filtering functionality…”
Get full text
Conference Proceeding Journal Article -
6
Security Theorems via Model Theory
Published in Electronic proceedings in theoretical computer science (17-11-2009)“…A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of…”
Get full text
Journal Article -
7
Authentication tests and the structure of bundles
Published in Theoretical computer science (14-06-2002)“…Suppose a principal in a cryptographic protocol creates and transmits a message containing a new value v, later receiving v back in a different cryptographic…”
Get full text
Journal Article -
8
Save that POCUS Scan
Published in Emergency medicine news (20-08-2024)Get full text
Journal Article -
9
Point-of-Care Ultrasound in the Diagnosis of Venous Thoracic Outlet Syndrome
Published in The Journal of emergency medicine (01-12-2022)“…Clinicians trained in point-of-care ultrasound (POCUS) use the tool to enhance diagnostic capabilities at the bedside, often excluding or diagnosing conditions…”
Get full text
Journal Article -
10
Choreographies with Secure Boxes and Compromised Principals
Published in Electronic proceedings in theoretical computer science (03-12-2009)“…We equip choreography-level session descriptions with a simple abstraction of a security infrastructure. Message components may be enclosed within (possibly…”
Get full text
Journal Article -
11
Execution Models for Choreographies and Cryptoprotocols
Published in Electronic proceedings in theoretical computer science (06-02-2010)“…A choreography describes a transaction in which several principals interact. Since choreographies frequently describe business processes affecting substantial…”
Get full text
Journal Article -
12
Fair Exchange in Strand Spaces
Published in Electronic proceedings in theoretical computer science (23-10-2009)“…Many cryptographic protocols are intended to coordinate state changes among principals. Exchange protocols coordinate delivery of new values to the…”
Get full text
Journal Article -
13
A Cut Principle for Information Flow
Published in 2015 IEEE 28th Computer Security Foundations Symposium (04-09-2015)“…We view a distributed system as a graph of active locations with unidirectional channels between them, through which they pass messages. In this context, the…”
Get full text
Conference Proceeding -
14
Principles of remote attestation
Published in International journal of information security (01-06-2011)“…Remote attestation is the activity of making a claim about properties of a target by supplying evidence to an appraiser over a network. We identify five…”
Get full text
Journal Article -
15
A Set Theory with Support for Partial Functions
Published in Studia logica (01-10-2000)“…Partial functions can be easily represented in set theory as certain sets of ordered pairs. However, classical set theory provides no special machinery for…”
Get full text
Journal Article -
16
Diagnostic point-of-care ultrasound: assessment techniques for the pediatric trauma patient
Published in Pediatric emergency medicine practice (15-07-2019)“…Emergency ultrasound is performed at the point of care to quickly answer focused clinical questions. Over the last 25 years, the use of this technique has…”
Get more information
Journal Article -
17
Strand spaces: Why is a security protocol correct?
Published in Proceedings - IEEE Computer Society Symposium on Research in Security and Privacy (01-01-1998)“…A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator…”
Get full text
Journal Article -
18
Filtering postures: Local enforcement for global policies
Published in Proceedings - IEEE Computer Society Symposium on Research in Security and Privacy (01-01-1997)“…When packet filtering is used as a security mechanism, different routers may need to cooperate to enforce the desired security policy. It is difficult to…”
Get full text
Journal Article -
19
Integrating Pre-test Probability and Point-of-Care Ultrasound (POCUS) in the Emergency Department (ED) Diagnosis of Small Bowel Obstruction (SBO)
Published in Curēus (Palo Alto, CA) (18-03-2024)“…Introduction A computed tomography (CT) scan and point-of-care ultrasound (POCUS) are commonly employed for diagnosing small bowel obstructions (SBOs). Prior…”
Get full text
Journal Article -
20
Diagnostic Emergency Ultrasound: Assessment Techniques In The Pediatric Patient
Published in Pediatric emergency medicine practice (01-01-2016)“…Emergency ultrasound is performed at the point of care to answer focused clinical questions in a rapid manner. Over the last 20 years, the use of this…”
Get more information
Journal Article