2009 |
27 | EE | Sean Peisert,
Matt Bishop,
Alec Yasinsac:
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines.
HICSS 2009: 1-10 |
2008 |
26 | EE | Alec Yasinsac,
Matt Bishop:
Of Paper Trails and Voter Receipts.
HICSS 2008: 487 |
25 | EE | Todd R. Andel,
Alec Yasinsac:
Automated Evaluation of Secure Route Discovery in MANET Protocols.
SPIN 2008: 26-41 |
24 | EE | Todd R. Andel,
Alec Yasinsac:
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols.
Electr. Notes Theor. Comput. Sci. 197(2): 3-14 (2008) |
2007 |
23 | EE | J. Todd McDonald,
Alec Yasinsac:
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs.
ARES 2007: 286-293 |
22 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks.
Ad Hoc Networks 5(3): 313-323 (2007) |
2006 |
21 | | Mike Burmester,
Alec Yasinsac:
Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers
Springer 2006 |
20 | EE | Alec Yasinsac,
J. Todd McDonald:
Foundations for Security Aware Software Development Education.
HICSS 2006 |
19 | EE | J. Todd McDonald,
Alec Yasinsac:
Application Security Models for Mobile Agent Systems.
Electr. Notes Theor. Comput. Sci. 157(3): 43-59 (2006) |
18 | EE | Todd R. Andel,
Alec Yasinsac:
On the Credibility of Manet Simulations.
IEEE Computer 39(7): 48-54 (2006) |
2005 |
17 | | Alec Yasinsac,
J. Todd McDonald:
Of unicorns and random programs.
Communications and Computer Networks 2005: 24-30 |
16 | EE | Mike Burmester,
Breno de Medeiros,
Alec Yasinsac:
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.
Security Protocols Workshop 2005: 228-237 |
15 | EE | Alec Yasinsac,
Mike Burmester:
Centers of Academic Excellence: A Case Study.
IEEE Security & Privacy 3(1): 62-65 (2005) |
14 | EE | Alec Yasinsac,
Justin Childs:
Formal analysis of modern security protocols.
Inf. Sci. 171(1-3): 189-211 (2005) |
2004 |
13 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks.
ADHOC-NOW 2004: 96-107 |
12 | | Willard Thompson,
Alec Yasinsac,
J. Todd McDonald:
Semantic Encryption Transformation Scheme.
ISCA PDCS 2004: 516-521 |
11 | | J. Todd McDonald,
Alec Yasinsac,
Willard C. Thompson III:
Mobile Agent Data Integrity Using Multi-agent Architecture.
ISCA PDCS 2004: 536-542 |
10 | | Donald J. Scott,
Alec Yasinsac:
Dynamic Probabilistic Retransmission in Ad Hoc Networks.
International Conference on Wireless Networks 2004: 158-164 |
9 | EE | Mike Burmester,
Yvo Desmedt,
Rebecca N. Wright,
Alec Yasinsac:
Accountable Privacy.
Security Protocols Workshop 2004: 83-95 |
8 | EE | Tysen Leckie,
Alec Yasinsac:
Metadata for Anomaly-Based Security Protocol Attack Deduction.
IEEE Trans. Knowl. Data Eng. 16(9): 1157-1168 (2004) |
2003 |
7 | EE | Mike Burmester,
Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.
Security Protocols Workshop 2003: 274-282 |
6 | EE | Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion).
Security Protocols Workshop 2003: 283-287 |
5 | EE | Alec Yasinsac,
Robert F. Erbacher,
Donald G. Marks,
Mark Pollitt,
Peter M. Sommer:
Computer Forensics Education.
IEEE Security & Privacy 1(4): 15-23 (2003) |
2002 |
4 | EE | Alec Yasinsac,
James A. Davis:
Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract).
Security Protocols Workshop 2002: 189-202 |
3 | | Alec Yasinsac:
An Environment for Security Protocol Intrusion Detection.
Journal of Computer Security 10(1/2): 177-188 (2002) |
2001 |
2 | | Alec Yasinsac,
Justin Childs:
Analyzing Internet Security Protocols.
HASE 2001: 149-162 |
1999 |
1 | EE | Alec Yasinsac,
William A. Wulf:
A Framework for a Cryptographic Protocol Evaluation Workbench.
HASE 1999: 197-206 |