Search the dblp DataBase
Alec Yasinsac :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
J. Todd McDonald , Alec Yasinsac , Willard C. Thompson III Mobile Agent Data Integrity Using Multi-agent Architecture. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2004, pp:536-542 [Conf ] Willard Thompson , Alec Yasinsac , J. Todd McDonald Semantic Encryption Transformation Scheme. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2004, pp:516-521 [Conf ] Mike Burmester , Tri Van Le , Alec Yasinsac Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ADHOC-NOW, 2004, pp:96-107 [Conf ] Alec Yasinsac , Justin Childs Analyzing Internet Security Protocols. [Citation Graph (0, 0)][DBLP ] HASE, 2001, pp:149-162 [Conf ] Alec Yasinsac , William A. Wulf A Framework for a Cryptographic Protocol Evaluation Workbench. [Citation Graph (0, 0)][DBLP ] HASE, 1999, pp:197-206 [Conf ] Alec Yasinsac , J. Todd McDonald Foundations for Security Aware Software Development Education. [Citation Graph (0, 0)][DBLP ] HICSS, 2006, pp:- [Conf ] Donald J. Scott , Alec Yasinsac Dynamic Probabilistic Retransmission in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] International Conference on Wireless Networks, 2004, pp:158-164 [Conf ] Mike Burmester , Alec Yasinsac Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:274-282 [Conf ] Mike Burmester , Yvo Desmedt , Rebecca N. Wright , Alec Yasinsac Accountable Privacy. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:83-95 [Conf ] Alec Yasinsac Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:283-287 [Conf ] Alec Yasinsac , James A. Davis Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2002, pp:189-202 [Conf ] Alec Yasinsac , J. Todd McDonald Of unicorns and random programs. [Citation Graph (0, 0)][DBLP ] Communications and Computer Networks, 2005, pp:24-30 [Conf ] Todd R. Andel , Alec Yasinsac On the Credibility of Manet Simulations. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2006, v:39, n:7, pp:48-54 [Journal ] J. Todd McDonald , Alec Yasinsac Application Security Models for Mobile Agent Systems. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2006, v:157, n:3, pp:43-59 [Journal ] Alec Yasinsac , Mike Burmester Centers of Academic Excellence: A Case Study. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2005, v:3, n:1, pp:62-65 [Journal ] Alec Yasinsac , Robert F. Erbacher , Donald G. Marks , Mark Pollitt , Peter M. Sommer Computer Forensics Education. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:15-23 [Journal ] Alec Yasinsac , Justin Childs Formal analysis of modern security protocols. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2005, v:171, n:1-3, pp:189-211 [Journal ] Alec Yasinsac An Environment for Security Protocol Intrusion Detection. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:1/2, pp:177-188 [Journal ] Tysen Leckie , Alec Yasinsac Metadata for Anomaly-Based Security Protocol Attack Deduction. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:9, pp:1157-1168 [Journal ] Mike Burmester , Tri Van Le , Alec Yasinsac Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2007, v:5, n:3, pp:313-323 [Journal ] Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. [Citation Graph (, )][DBLP ] Of Paper Trails and Voter Receipts. [Citation Graph (, )][DBLP ] Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. [Citation Graph (, )][DBLP ] Automated Evaluation of Secure Route Discovery in MANET Protocols. [Citation Graph (, )][DBLP ] Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP ] Surveying security analysis techniques in MANET routing protocols. [Citation Graph (, )][DBLP ] Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.305secs