default search action
Alec Yasinsac
Person information
- affiliation: Florida State University, Tallahassee, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i2]Ryan W. Gardner, Tadayoshi Kohno, Alec Yasinsac:
Attacking the Diebold Signature Variant - RSA Signatures with Unverified High-order Padding. CoRR abs/2403.01048 (2024)
2010 – 2019
- 2016
- [j16]Mark Yampolskiy, Anthony Skjellum, Michael Kretzschmar, Ruel A. Overfelt, Kenneth R. Sloan, Alec Yasinsac:
Using 3D printers as weapons. Int. J. Crit. Infrastructure Prot. 14: 58-71 (2016) - [c34]Dustin Mink, Alec Yasinsac, Kim-Kwang Raymond Choo, William Bradley Glisson:
Next Generation Aircraft Architecture and Digital Forensic. AMCIS 2016 - [i1]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Towards Security of Additive Layer Manufacturing. CoRR abs/1602.07536 (2016) - 2015
- [c33]Mark Yampolskiy, Lena Schutzle, Uday Vaidya, Alec Yasinsac:
Security Challenges of Additive Manufacturing with Metals and Alloys. Critical Infrastructure Protection 2015: 169-183 - 2014
- [c32]Mark Yampolskiy, Todd R. Andel, Jeffrey Todd McDonald, William Bradley Glisson, Alec Yasinsac:
Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing. PPREW@ACSAC 2014: 7:1-7:9 - 2013
- [j15]Alec Yasinsac, Cynthia E. Irvine:
Help! Is There a Trustworthy-Systems Doctor in the House? IEEE Secur. Priv. 11(1): 73-77 (2013) - [c31]Alec Yasinsac:
A Model for Managing System Insiders. HICSS 2013: 1813-1820 - [c30]Alec Yasinsac:
Independent Computations for Safe Remote Electronic Voting. Security Protocols Workshop 2013: 71-83 - [c29]Alec Yasinsac:
Independent Computations for Safe Remote Electronic Voting (Transcript of Discussion). Security Protocols Workshop 2013: 84-93 - 2012
- [j14]Michael Ian Shamos, Alec Yasinsac:
Realities of E-voting Security. IEEE Secur. Priv. 10(5): 16-17 (2012) - [j13]Alec Yasinsac:
Precision in elections - Extracting a precise result from an inherently imprecise process. Int. J. Crit. Infrastructure Prot. 5(3-4): 135-136 (2012) - [c28]Todd R. Andel, Alec Yasinsac:
Secure Internet Voting Protocol for Overseas Military Voters. Security Protocols Workshop 2012: 3-14 - 2011
- [j12]John Harold Pardue, Jeffrey P. Landry, Alec Yasinsac:
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems. Int. J. Inf. Secur. Priv. 5(3): 19-35 (2011) - [j11]Todd R. Andel, Greg Back, Alec Yasinsac:
Automating the security analysis process of secure ad hoc routing protocols. Simul. Model. Pract. Theory 19(9): 2032-2049 (2011) - [c27]Alec Yasinsac, Jonathan Alawine:
Insider-free systems. CSIIRW 2011: 75 - 2010
- [c26]John Harold Pardue, Alec Yasinsac, Jeffrey P. Landry:
Towards Internet voting security: A threat tree for risk assessment. CRiSIS 2010: 1-7 - [c25]Jingshan Huang, Alec Yasinsac, Patrick J. Hayes:
Knowledge Sharing and Reuse in Digital Forensics. SADFE 2010: 73-78
2000 – 2009
- 2009
- [c24]Sean Peisert, Matt Bishop, Alec Yasinsac:
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines. HICSS 2009: 1-10 - [c23]John Harold Pardue, Jeffrey P. Landry, Alec Yasinsac:
A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation. REVOTE 2009: 55-60 - 2008
- [j10]Alec Yasinsac, Matt Bishop:
The Dynamics of Counting and Recounting Votes. IEEE Secur. Priv. 6(3): 22-29 (2008) - [j9]Alec Yasinsac, Jeffrey Todd McDonald:
Tamper Resistant Software Through Intent Protection. Int. J. Netw. Secur. 7(3): 370-382 (2008) - [c22]Alec Yasinsac, Matt Bishop:
Of Paper Trails and Voter Receipts. HICSS 2008: 487 - [c21]Todd R. Andel, Alec Yasinsac:
Automated Evaluation of Secure Route Discovery in MANET Protocols. SPIN 2008: 26-41 - 2007
- [j8]Mike Burmester, Tri Van Le, Alec Yasinsac:
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks. Ad Hoc Networks 5(3): 313-323 (2007) - [j7]Todd R. Andel, Alec Yasinsac:
Surveying security analysis techniques in MANET routing protocols. IEEE Commun. Surv. Tutorials 9(1-4): 70-84 (2007) - [c20]Jeffrey Todd McDonald, Alec Yasinsac:
Applications for Provably Secure Intent Protection with Bounded Input-Size Programs. ARES 2007: 286-293 - [c19]Alec Yasinsac, Jeffrey Todd McDonald:
Towards Working with Small Atomic Functions. Security Protocols Workshop 2007: 191-200 - [c18]Alec Yasinsac:
Towards Working with Small Atomic Functions - (Transcript of Discussion). Security Protocols Workshop 2007: 201-203 - [c17]Todd R. Andel, Alec Yasinsac:
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols. STM@ESORICS 2007: 3-14 - 2006
- [j6]Todd R. Andel, Alec Yasinsac:
On the Credibility of Manet Simulations. Computer 39(7): 48-54 (2006) - [c16]Alec Yasinsac, Jeffrey Todd McDonald:
Foundations for Security Aware Software Development Education. HICSS 2006 - [e1]Mike Burmester, Alec Yasinsac:
Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4074, Springer 2006, ISBN 3-540-36646-6 [contents] - 2005
- [j5]Alec Yasinsac, Mike Burmester:
Centers of Academic Excellence: A Case Study. IEEE Secur. Priv. 3(1): 62-65 (2005) - [j4]Alec Yasinsac, Justin Childs:
Formal analysis of modern security protocols. Inf. Sci. 171(1-3): 189-211 (2005) - [c15]Alec Yasinsac, Jeffrey Todd McDonald:
Of unicorns and random programs. Communications and Computer Networks 2005: 24-30 - [c14]Tina Suen, Alec Yasinsac:
Peer identification in wireless and sensor networks using signal properties. MASS 2005 - [c13]Mike Burmester, Breno de Medeiros, Alec Yasinsac:
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Security Protocols Workshop 2005: 228-237 - [c12]Jeffrey Todd McDonald, Alec Yasinsac:
Application Security Models for Mobile Agent Systems. STM 2005: 43-59 - 2004
- [j3]Tysen Leckie, Alec Yasinsac:
Metadata for Anomaly-Based Security Protocol Attack Deduction. IEEE Trans. Knowl. Data Eng. 16(9): 1157-1168 (2004) - [c11]Willard Thompson, Alec Yasinsac, Jeffrey Todd McDonald:
Semantic Encryption Transformation Scheme. PDCS 2004: 516-521 - [c10]Jeffrey Todd McDonald, Alec Yasinsac, Willard C. Thompson III:
Mobile Agent Data Integrity Using Multi-agent Architecture. PDCS 2004: 536-542 - [c9]Mike Burmester, Tri Van Le, Alec Yasinsac:
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks. ADHOC-NOW 2004: 96-107 - [c8]Donald J. Scott, Alec Yasinsac:
Dynamic Probabilistic Retransmission in Ad Hoc Networks. International Conference on Wireless Networks 2004: 158-164 - [c7]Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac:
Accountable Privacy. Security Protocols Workshop 2004: 83-95 - 2003
- [j2]Alec Yasinsac, Robert F. Erbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer:
Computer Forensics Education. IEEE Secur. Priv. 1(4): 15-23 (2003) - [c6]Mike Burmester, Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks. Security Protocols Workshop 2003: 274-282 - [c5]Alec Yasinsac:
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks (Discussion). Security Protocols Workshop 2003: 283-287 - 2002
- [j1]Alec Yasinsac:
An Environment for Security Protocol Intrusion Detection. J. Comput. Secur. 10(1/2): 177-188 (2002) - [c4]Alec Yasinsac, James A. Davis:
Modeling Protocols for Secure Group Communications in Ad Hoc Networks: (Extended Abstract). Security Protocols Workshop 2002: 189-202 - 2001
- [c3]Alec Yasinsac, Justin Childs:
Analyzing Internet Security Protocols. HASE 2001: 149-162 - 2000
- [c2]Alec Yasinsac:
Dynamic analysis of security protocols. NSPW 2000: 77-87
1990 – 1999
- 1999
- [c1]Alec Yasinsac, William A. Wulf:
A Framework for a Cryptographic Protocol Evaluation Workbench. HASE 1999: 197-206
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint