2007 | ||
---|---|---|
7 | EE | J. Todd McDonald, Alec Yasinsac: Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. ARES 2007: 286-293 |
2006 | ||
6 | EE | Alec Yasinsac, J. Todd McDonald: Foundations for Security Aware Software Development Education. HICSS 2006 |
5 | EE | J. Todd McDonald, Alec Yasinsac: Application Security Models for Mobile Agent Systems. Electr. Notes Theor. Comput. Sci. 157(3): 43-59 (2006) |
2005 | ||
4 | Alec Yasinsac, J. Todd McDonald: Of unicorns and random programs. Communications and Computer Networks 2005: 24-30 | |
3 | EE | J. Todd McDonald: Hybrid Approach for Secure Mobile Agent Computations. MADNES 2005: 38-53 |
2004 | ||
2 | Willard Thompson, Alec Yasinsac, J. Todd McDonald: Semantic Encryption Transformation Scheme. ISCA PDCS 2004: 516-521 | |
1 | J. Todd McDonald, Alec Yasinsac, Willard C. Thompson III: Mobile Agent Data Integrity Using Multi-agent Architecture. ISCA PDCS 2004: 536-542 |
1 | Willard Thompson | [2] |
2 | Willard C. Thompson III | [1] |
3 | Alec Yasinsac | [1] [2] [4] [5] [6] [7] |