Alec Yasinsac

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

27EESean Peisert, Matt Bishop, Alec Yasinsac: Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10
26EEAlec Yasinsac, Matt Bishop: Of Paper Trails and Voter Receipts. HICSS 2008: 487
25EETodd R. Andel, Alec Yasinsac: Automated Evaluation of Secure Route Discovery in MANET Protocols. SPIN 2008: 26-41
24EETodd R. Andel, Alec Yasinsac: Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols. Electr. Notes Theor. Comput. Sci. 197(2): 3-14 (2008)
23EEJ. Todd McDonald, Alec Yasinsac: Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. ARES 2007: 286-293
22EEMike Burmester, Tri Van Le, Alec Yasinsac: Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. Ad Hoc Networks 5(3): 313-323 (2007)
21 Mike Burmester, Alec Yasinsac: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers Springer 2006
20EEAlec Yasinsac, J. Todd McDonald: Foundations for Security Aware Software Development Education. HICSS 2006
19EEJ. Todd McDonald, Alec Yasinsac: Application Security Models for Mobile Agent Systems. Electr. Notes Theor. Comput. Sci. 157(3): 43-59 (2006)
18EETodd R. Andel, Alec Yasinsac: On the Credibility of Manet Simulations. IEEE Computer 39(7): 48-54 (2006)
17 Alec Yasinsac, J. Todd McDonald: Of unicorns and random programs. Communications and Computer Networks 2005: 24-30
16EEMike Burmester, Breno de Medeiros, Alec Yasinsac: Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Security Protocols Workshop 2005: 228-237
15EEAlec Yasinsac, Mike Burmester: Centers of Academic Excellence: A Case Study. IEEE Security & Privacy 3(1): 62-65 (2005)
14EEAlec Yasinsac, Justin Childs: Formal analysis of modern security protocols. Inf. Sci. 171(1-3): 189-211 (2005)
13EEMike Burmester, Tri Van Le, Alec Yasinsac: Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. ADHOC-NOW 2004: 96-107
12 Willard Thompson, Alec Yasinsac, J. Todd McDonald: Semantic Encryption Transformation Scheme. ISCA PDCS 2004: 516-521
11 J. Todd McDonald, Alec Yasinsac, Willard C. Thompson III: Mobile Agent Data Integrity Using Multi-agent Architecture. ISCA PDCS 2004: 536-542
10 Donald J. Scott, Alec Yasinsac: Dynamic Probabilistic Retransmission in Ad Hoc Networks. International Conference on Wireless Networks 2004: 158-164
9EEMike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac: Accountable Privacy. Security Protocols Workshop 2004: 83-95
8EETysen Leckie, Alec Yasinsac: Metadata for Anomaly-Based Security Protocol Attack Deduction. IEEE Trans. Knowl. Data Eng. 16(9): 1157-1168 (2004)
7EEMike Burmester, Alec Yasinsac: Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. Security Protocols Workshop 2003: 274-282
6EEAlec Yasinsac: Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). Security Protocols Workshop 2003: 283-287
5EEAlec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer: Computer Forensics Education. IEEE Security & Privacy 1(4): 15-23 (2003)
4EEAlec Yasinsac, James A. Davis: Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). Security Protocols Workshop 2002: 189-202
3 Alec Yasinsac: An Environment for Security Protocol Intrusion Detection. Journal of Computer Security 10(1/2): 177-188 (2002)
2 Alec Yasinsac, Justin Childs: Analyzing Internet Security Protocols. HASE 2001: 149-162
1EEAlec Yasinsac, William A. Wulf: A Framework for a Cryptographic Protocol Evaluation Workbench. HASE 1999: 197-206

Coauthor Index

1Todd R. Andel [18] [24] [25]
2Matt Bishop [26] [27]
3Mike Burmester [7] [9] [13] [15] [16] [21] [22]
4Justin Childs [2] [14]
5James A. Davis [4]
6Yvo Desmedt [9]
7Robert F. Erbacher [5]
8Tri Van Le [13] [22]
9Tysen Leckie [8]
10Donald G. Marks [5]
11J. Todd McDonald [11] [12] [17] [19] [20] [23]
12Breno de Medeiros [16]
13Sean Peisert [27]
14Mark Pollitt [5]
15Donald J. Scott [10]
16Peter M. Sommer [5]
17Willard Thompson [12]
18Willard C. Thompson III [11]
19Rebecca N. Wright [9]
20William A. Wulf [1]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)