| 2009 |
| 27 | EE | Sean Peisert,
Matt Bishop,
Alec Yasinsac:
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines.
HICSS 2009: 1-10 |
| 2008 |
| 26 | EE | Alec Yasinsac,
Matt Bishop:
Of Paper Trails and Voter Receipts.
HICSS 2008: 487 |
| 25 | EE | Todd R. Andel,
Alec Yasinsac:
Automated Evaluation of Secure Route Discovery in MANET Protocols.
SPIN 2008: 26-41 |
| 24 | EE | Todd R. Andel,
Alec Yasinsac:
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols.
Electr. Notes Theor. Comput. Sci. 197(2): 3-14 (2008) |
| 2007 |
| 23 | EE | J. Todd McDonald,
Alec Yasinsac:
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs.
ARES 2007: 286-293 |
| 22 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks.
Ad Hoc Networks 5(3): 313-323 (2007) |
| 2006 |
| 21 | | Mike Burmester,
Alec Yasinsac:
Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers
Springer 2006 |
| 20 | EE | Alec Yasinsac,
J. Todd McDonald:
Foundations for Security Aware Software Development Education.
HICSS 2006 |
| 19 | EE | J. Todd McDonald,
Alec Yasinsac:
Application Security Models for Mobile Agent Systems.
Electr. Notes Theor. Comput. Sci. 157(3): 43-59 (2006) |
| 18 | EE | Todd R. Andel,
Alec Yasinsac:
On the Credibility of Manet Simulations.
IEEE Computer 39(7): 48-54 (2006) |
| 2005 |
| 17 | | Alec Yasinsac,
J. Todd McDonald:
Of unicorns and random programs.
Communications and Computer Networks 2005: 24-30 |
| 16 | EE | Mike Burmester,
Breno de Medeiros,
Alec Yasinsac:
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.
Security Protocols Workshop 2005: 228-237 |
| 15 | EE | Alec Yasinsac,
Mike Burmester:
Centers of Academic Excellence: A Case Study.
IEEE Security & Privacy 3(1): 62-65 (2005) |
| 14 | EE | Alec Yasinsac,
Justin Childs:
Formal analysis of modern security protocols.
Inf. Sci. 171(1-3): 189-211 (2005) |
| 2004 |
| 13 | EE | Mike Burmester,
Tri Van Le,
Alec Yasinsac:
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks.
ADHOC-NOW 2004: 96-107 |
| 12 | | Willard Thompson,
Alec Yasinsac,
J. Todd McDonald:
Semantic Encryption Transformation Scheme.
ISCA PDCS 2004: 516-521 |
| 11 | | J. Todd McDonald,
Alec Yasinsac,
Willard C. Thompson III:
Mobile Agent Data Integrity Using Multi-agent Architecture.
ISCA PDCS 2004: 536-542 |
| 10 | | Donald J. Scott,
Alec Yasinsac:
Dynamic Probabilistic Retransmission in Ad Hoc Networks.
International Conference on Wireless Networks 2004: 158-164 |
| 9 | EE | Mike Burmester,
Yvo Desmedt,
Rebecca N. Wright,
Alec Yasinsac:
Accountable Privacy.
Security Protocols Workshop 2004: 83-95 |
| 8 | EE | Tysen Leckie,
Alec Yasinsac:
Metadata for Anomaly-Based Security Protocol Attack Deduction.
IEEE Trans. Knowl. Data Eng. 16(9): 1157-1168 (2004) |
| 2003 |
| 7 | EE | Mike Burmester,
Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.
Security Protocols Workshop 2003: 274-282 |
| 6 | EE | Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion).
Security Protocols Workshop 2003: 283-287 |
| 5 | EE | Alec Yasinsac,
Robert F. Erbacher,
Donald G. Marks,
Mark Pollitt,
Peter M. Sommer:
Computer Forensics Education.
IEEE Security & Privacy 1(4): 15-23 (2003) |
| 2002 |
| 4 | EE | Alec Yasinsac,
James A. Davis:
Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract).
Security Protocols Workshop 2002: 189-202 |
| 3 | | Alec Yasinsac:
An Environment for Security Protocol Intrusion Detection.
Journal of Computer Security 10(1/2): 177-188 (2002) |
| 2001 |
| 2 | | Alec Yasinsac,
Justin Childs:
Analyzing Internet Security Protocols.
HASE 2001: 149-162 |
| 1999 |
| 1 | EE | Alec Yasinsac,
William A. Wulf:
A Framework for a Cryptographic Protocol Evaluation Workbench.
HASE 1999: 197-206 |