The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alec Yasinsac: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. J. Todd McDonald, Alec Yasinsac, Willard C. Thompson III
    Mobile Agent Data Integrity Using Multi-agent Architecture. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:536-542 [Conf]
  2. Willard Thompson, Alec Yasinsac, J. Todd McDonald
    Semantic Encryption Transformation Scheme. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:516-521 [Conf]
  3. Mike Burmester, Tri Van Le, Alec Yasinsac
    Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ADHOC-NOW, 2004, pp:96-107 [Conf]
  4. Alec Yasinsac, Justin Childs
    Analyzing Internet Security Protocols. [Citation Graph (0, 0)][DBLP]
    HASE, 2001, pp:149-162 [Conf]
  5. Alec Yasinsac, William A. Wulf
    A Framework for a Cryptographic Protocol Evaluation Workbench. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:197-206 [Conf]
  6. Alec Yasinsac, J. Todd McDonald
    Foundations for Security Aware Software Development Education. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  7. Donald J. Scott, Alec Yasinsac
    Dynamic Probabilistic Retransmission in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    International Conference on Wireless Networks, 2004, pp:158-164 [Conf]
  8. Mike Burmester, Alec Yasinsac
    Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:274-282 [Conf]
  9. Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac
    Accountable Privacy. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:83-95 [Conf]
  10. Alec Yasinsac
    Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:283-287 [Conf]
  11. Alec Yasinsac, James A. Davis
    Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:189-202 [Conf]
  12. Alec Yasinsac, J. Todd McDonald
    Of unicorns and random programs. [Citation Graph (0, 0)][DBLP]
    Communications and Computer Networks, 2005, pp:24-30 [Conf]
  13. Todd R. Andel, Alec Yasinsac
    On the Credibility of Manet Simulations. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2006, v:39, n:7, pp:48-54 [Journal]
  14. J. Todd McDonald, Alec Yasinsac
    Application Security Models for Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:43-59 [Journal]
  15. Alec Yasinsac, Mike Burmester
    Centers of Academic Excellence: A Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:1, pp:62-65 [Journal]
  16. Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer
    Computer Forensics Education. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:15-23 [Journal]
  17. Alec Yasinsac, Justin Childs
    Formal analysis of modern security protocols. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2005, v:171, n:1-3, pp:189-211 [Journal]
  18. Alec Yasinsac
    An Environment for Security Protocol Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:177-188 [Journal]
  19. Tysen Leckie, Alec Yasinsac
    Metadata for Anomaly-Based Security Protocol Attack Deduction. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:9, pp:1157-1168 [Journal]
  20. Mike Burmester, Tri Van Le, Alec Yasinsac
    Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2007, v:5, n:3, pp:313-323 [Journal]

  21. Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. [Citation Graph (, )][DBLP]


  22. Of Paper Trails and Voter Receipts. [Citation Graph (, )][DBLP]


  23. Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. [Citation Graph (, )][DBLP]


  24. Automated Evaluation of Secure Route Discovery in MANET Protocols. [Citation Graph (, )][DBLP]


  25. Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]


  26. Surveying security analysis techniques in MANET routing protocols. [Citation Graph (, )][DBLP]


  27. Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002