Alec Yasinsac

Affiliations:
  • Florida State University, Tallahassee, USA


According to our database1, Alec Yasinsac authored at least 52 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Attacking the Diebold Signature Variant - RSA Signatures with Unverified High-order Padding.
CoRR, 2024

2016
Using 3D printers as weapons.
Int. J. Crit. Infrastructure Prot., 2016

Towards Security of Additive Layer Manufacturing.
CoRR, 2016

Next Generation Aircraft Architecture and Digital Forensic.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Security Challenges of Additive Manufacturing with Metals and Alloys.
Proceedings of the Critical Infrastructure Protection IX, 2015

2014
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing.
Proceedings of the 4th Program Protection and Reverse Engineering Workshop, 2014

2013
Help! Is There a Trustworthy-Systems Doctor in the House?
IEEE Secur. Priv., 2013

Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Independent Computations for Safe Remote Electronic Voting.
Proceedings of the Security Protocols XXI, 2013

A Model for Managing System Insiders.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Precision in elections - Extracting a precise result from an inherently imprecise process.
Int. J. Crit. Infrastructure Prot., 2012

Realities of E-voting Security.
IEEE Secur. Priv., 2012

Secure Internet Voting Protocol for Overseas Military Voters.
Proceedings of the Security Protocols XX, 2012

2011
Automating the security analysis process of secure ad hoc routing protocols.
Simul. Model. Pract. Theory, 2011

E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems.
Int. J. Inf. Secur. Priv., 2011

Insider-free systems.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Knowledge Sharing and Reuse in Digital Forensics.
Proceedings of the Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2010

Towards Internet voting security: A threat tree for risk assessment.
Proceedings of the CRiSIS 2010, 2010

2009
A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Tamper Resistant Software Through Intent Protection.
Int. J. Netw. Secur., 2008

The Dynamics of Counting and Recounting Votes.
IEEE Secur. Priv., 2008

Automated Evaluation of Secure Route Discovery in MANET Protocols.
Proceedings of the Model Checking Software, 2008

Of Paper Trails and Voter Receipts.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

2007
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

Surveying security analysis techniques in MANET routing protocols.
IEEE Commun. Surv. Tutorials, 2007

Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks.
Ad Hoc Networks, 2007

Towards Working with Small Atomic Functions.
Proceedings of the Security Protocols, 2007

Towards Working with Small Atomic Functions - (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Applications for Provably Secure Intent Protection with Bounded Input-Size Programs.
Proceedings of the The Second International Conference on Availability, 2007

2006
On the Credibility of Manet Simulations.
Computer, 2006

Foundations for Security Aware Software Development Education.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2005
Formal analysis of modern security protocols.
Inf. Sci., 2005

Centers of Academic Excellence: A Case Study.
IEEE Secur. Priv., 2005

Application Security Models for Mobile Agent Systems.
Proceedings of the First International Workshop on Security and Trust Management, 2005

Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.
Proceedings of the Security Protocols, 2005

Peer identification in wireless and sensor networks using signal properties.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Of unicorns and random programs.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

2004
Metadata for Anomaly-Based Security Protocol Attack Deduction.
IEEE Trans. Knowl. Data Eng., 2004

Accountable Privacy.
Proceedings of the Security Protocols, 2004

Dynamic Probabilistic Retransmission in Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

Semantic Encryption Transformation Scheme.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

Mobile Agent Data Integrity Using Multi-agent Architecture.
Proceedings of the ISCA 17th International Conference on Parallel and Distributed Computing Systems, 2004

2003
Computer Forensics Education.
IEEE Secur. Priv., 2003

Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion).
Proceedings of the Security Protocols, 2003

Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks.
Proceedings of the Security Protocols, 2003

2002
An Environment for Security Protocol Intrusion Detection.
J. Comput. Secur., 2002

Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract).
Proceedings of the Security Protocols, 2002

2001
Analyzing Internet Security Protocols.
Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2001), 2001

2000
Dynamic analysis of security protocols.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

1999
A Framework for a Cryptographic Protocol Evaluation Workbench.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999


  Loading...