Alan T. Sherman

According to our database1, Alan T. Sherman authored at least 51 papers between 1982 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
On the Origins and Variations of Blockchain Technologies.
IEEE Security & Privacy, 2019

The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
CoRR, 2019

2018
Cybersecurity: Exploring core concepts through six scenarios.
Cryptologia, 2018

Phishing in an Academic Community: A Study of User Susceptibility and Behavior.
CoRR, 2018

The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students.
CoRR, 2018

On the Origins and Variations of Blockchain Technologies.
CoRR, 2018

2017
Mini-MAC: Raising the bar for vehicular security with a lightweight message authentication protocol.
Vehicular Communications, 2017

INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Security & Privacy, 2017

Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario.
Cryptologia, 2017

Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project.
CoRR, 2017

The INSuRE Project: CAE-Rs Collaborate to Engage Students in Cybersecurity Research.
CoRR, 2017

cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
cMix: Anonymization byHigh-Performance Scalable Mixing.
IACR Cryptology ePrint Archive, 2016

How students reason about Cybersecurity concepts.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2014
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search.
IACR Cryptology ePrint Archive, 2014

DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptology ePrint Archive, 2014

A Preliminary FPGA Implementation and Analysis of Phatak's Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System.
IACR Cryptology ePrint Archive, 2014

SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education.
Proceedings of the 2014 USENIX Summit on Gaming, 2014

2013
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense.
Journal of Computer Security, 2013

2012
Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies.
Cryptologia, 2012

Change-Link: a digital forensic tool for visualizing changes to directory trees.
Proceedings of the 2012 Symposium on Visualization for Cyber Security, 2012

2011
Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

A New Paradigm to Approximate Oblivious Data Processing (ODP) for Data Confidentiality in Cloud Computing.
Proceedings of the World Congress on Services, 2011

2010
Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules.
IEEE Trans. Information Forensics and Security, 2010

Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Information Forensics and Security, 2010

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010

Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010


2009
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules.
IEEE Trans. Information Forensics and Security, 2009

Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Information Forensics and Security, 2009

2008
Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting.
IEEE Security & Privacy, 2008

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2006
An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study.
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006

2003
Key Establishment in Large Dynamic Groups Using One-Way Function Trees.
IEEE Trans. Software Eng., 2003

1997
An Observation on Associative One-Way Functions in Complexity Theory.
Inf. Process. Lett., 1997

How to Break Gifford's Cipher.
Cryptologia, 1997

1995
Expected Wire Length between Two Randomly Chosen Terminals.
SIAM Review, 1995

*Socrates 2.0 Beats Grandmaster Sagalchik.
ICGA Journal, 1995

1994
Experimental evaluation of a partitioning algorithm for the steiner tree problem in R2 and R3.
Networks, 1994

Probabilistic analysis of an enhanced partitioning algorithm for the steiner tree problem in Rd.
Networks, 1994

Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English.
Cryptologia, 1994

How to Break Gifford's Cipher (extended abstract).
Proceedings of the CCS '94, 1994

1993
Statistical Techniques for Language Recognition: an Introduction and Guide for Cryptanalysts.
Cryptologia, 1993

1990
A Note on Bennett's Time-Space Tradeoff for Reversible Computation.
SIAM J. Comput., 1990

How we Solved the $100, 000 Decipher Puzzle (16 Hours too late).
Cryptologia, 1990

1989
VLSI Placement and Routing - The PI Project.
Texts and Monographs in Computer Science, Springer, ISBN: 978-1-4613-9658-1, 1989

1988
Is the Data Encryption Standard a Group? (Results of Cycling Experiments on DES).
J. Cryptology, 1988

1985
Is the Data Encryption Standard a Group? (Preliminary Abstract).
Proceedings of the Advances in Cryptology, 1985

Is DES a Pure Cipher? (Results of More Cycling Experiments on DES).
Proceedings of the Advances in Cryptology, 1985

1982
Randomized Encryption Techniques.
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982


  Loading...