Alec Yasinsac’s Publications
- M.
Burmester and A. Yasinsac (Editors), Mobile and AD hoc Networks and
Sensors Security (MADNES 2005), Lecture Notes in Computer Science,
LNCS 4074, Springer-Verlag, Berlin Heidelberg,
2006
- Alec Yasinsac
and J. Todd McDonald, "Tamper Resistant Software Through Intent
Protection", the International Journal of Network Security, to
appear, accepted June 2007
- Todd Andel and Alec
Yasinsac, “Surveying MANET Protocol Security
Analysis”, IEEE Communications Surveys and Tutorials, to appear,
accepted April 20, 2007
- Todd R. Andel, Alec
Yasinsac, "On the Credibility of Manet Simulations," Computer, vol. 39, no.
7, pp. 48-54, July 2006
- Mike Burmester, Tri Le Van, and Alec Yasinsac, "Adaptive gossip protocols:
Managing Redundancy and Security in Ad hoc Networks", accepted to AdHoc Networks, Elsevier, November 2004, 12 pages.
- Alec Yasinsac
and Mike Burmester, "Centers of Academic Excellence: A Case
Study", IEEE Security and Privacy Magazine, Vol. 3, Issue 1, 2005,
pp. 32-35
- Tysen Leckie
and Alec Yasinsac,
"Metadata for Anomaly Based Security Protocol Attack Detection",
IEEE Transactions on Knowledge and Data Engineering, Volume 16,
Number 10, October 2004
- Alec Yasinsac
and Justin Childs, "Formal
Analysis of Modern Security Protocols", to appear, Information
Sciences, (Elsevier) 2004.
- Mike Burmester and Alec Yasinsac, "Trust Infrastructures for
Wireless, Mobile Networks", WSEAS
Transactions on Telecommunications, Vol. 3, #1, January 2004, pp.
377-82
- Alec
Yasinsac, Robert Earbacher,
Donald G. Marks, Mark Pollitt, Peter M. Sommer,
"Computer Forensics Education", IEEE Computer Security and
Privacy Magazine, July-Aug 2003, Vol. 1, No. 4, pp. 15-23
- Alec
Yasinsac, "An Environment for Security Protocol
Intrusion Detection", Journal of Computer Security, Vol. 10,
No. 1-2, 2002, pp. 177-88
- Alec
Yasinsac, "Information Security Curricula in
Computer Science Departments: Theory and Practice,"
The George
Washington University
Journal of Information Security, Volume 1, Number 2,
2002
- Alec
Yasinsac and Wm. A. Wulf, "A Framework for A
Cryptographic Protocol Evaluation Workbench", The International
Journal of Reliability, Quality and Safety Engineering (IJRQSE), Vol.
8 No. 4, December 01, 2001, pp 373-89
Return
to top of the page
- Alec Yasinsac
and Matt Bishop, “Of Paper
Trails and Voter Receipts”, to appear in Proceedings of the 41st Hawaii
International Conference on System Sciences, MINITRACK: Digital Forensics
– State of the Science and Foundational Research Activity, January 7-10,
2008
- Todd R. Andel and Alec
Yasinsac, “Adaptive Threat Modeling for Secure Ad Hoc
Routing Protocols”, Electronic Notes in Theoretical Computer Science, 3rd
International Workshop on Security and Trust Management (STM07), September
26-27th, 2007, Dresden, Germany
- Todd R. Andel and Alec
Yasinsac, “Automated Security Analysis of Ad Hoc Routing
Protocols”, Workshop on Foundations of Computer Security and Automated
Reasoning for Security Protocol Analysis, Wroclaw, Poland, July 8-9, 2007
- Alec Yasinsac
and J. Todd McDonald, “Towards Working With Small Atomic Functions”, the
Fifteenth International Workshop on Security Protocols, Brno, Czech
Republic, 18-20 April 2007, LNCS (to appear)
- J. Todd McDonald and Alec
Yasinsac, “Applications for Provably Secure Intent
Protection with Bounded Input-Size Programs”, The International Conference
on Availability, Reliability and Security (ARES
2007), April 10-13, 2007 (28%, 60/212)
- Todd Andel and Alec
Yasinsac, “Invisible Node Revisited”, IEEE Southeast
Conference 2007 (SoutheastCon 2007), March
22-25, 2007, pp. 686-691.
- J. Todd McDonald and Alec
Yasinsac, "Program Intent Protection Using Circuit
Encryption", 8th International Symposium on System and Information Security,
Sao Jose dos
Campos, Sao Paulo, Brazil, November 8-10, 2006 (29%, 40/140)
- Alec Yasinsac,
“Non-Boolean Authentication", 2nd International Semantic Web Policy
Workshop, Athens, Georgia, USA, Nov 6-9, 2006
- Todd Andel and Alec
Yasinsac, "Wireless Protocol Security; to Simulate
or not Simulate", Symposium on Simulation Software and Security,
affiliated with the 2006 Spring Simulation Multi-conference (SpringSim06),
Von Braun Center, Huntsville, Alabama, April 2-6, 2006
- Alec Yasinsac
and J. Todd McDonald, "Security-Aware Coding", 39th Annual Hawaii
International Conference On System Sciences, Mini-track on Information
Security Education and Foundational Research, Jan. 4-7, 2006
- Tina Suen and Alec Yasinsac,
"Peer Identification in Wireless Sensor Networks Using Signal
Properties", Proceedings of the 2005 IEEE Workshop on Wireless and
Sensor Network Security, Nov. 7-10, 2005, Washington DC
- Alec Yasinsac
and J. Todd McDonald, "Of Unicorns and Random Programs", The
Third IASTED International Conference on Communications and Computer
Networks, (CCN 2005), October 24-26, 2005, Marina
del Rey, CA, USA
- Tina Suen and Alec Yasinsac,
"Peer Identification in Wireless Sensor Networks Using Signal
Properties", 2005 IEEE Workshop on Wireless and Sensor Network Security,
Nov. 7-10, Washington DC
- J. Todd McDonald and Alec
Yasinsac, "Application Security Models for Mobile
Agent Systems", Proceedings of the 1st International Workshop on
Security and Trust Management, Electronic Notes in Theoretical Computer
Science, September 15, 2005, 25% acceptance (9/36)
- Mike Burmester, Breno DeMederios,
and Alec Yasinsac,
"Community-centric vanilla-rollback access, or: How I stopped
worrying and learned to love my computer", to appear Thirteenth
International Workshop on Security Protocols, April 20-22, 2005, LNCS
- Willard Thompson, Alec
Yasinsac, and Todd McDonald, "Semantic Encryption
Transformation Scheme", Proceedings of the 2004 International
Workshop on Security in Parallel and Distributed Systems, San
Francisco, CA, September 15-17, 2004, pp. 516-21
- Todd McDonald, Alec
Yasinsac, and Willard Thompson, "Mobile Agent Data
Integrity Using Multi-agent Architecture", in press in the Proceedings
of the 2004 International Workshop on Security in Parallel and Distributed
Systems, San Francisco, CA, September 15-17, 2004, pp. 536-42
- Mike Burmester, Tri Le Van, and Alec Yasinsac, "Weathering the Storm:
Managing Redundancy and Security in Ad hoc Networks ", 3rd
International Conference on AD-HOC Networks & Wireless, July
20-22, 2004, LNCS 3158, Springer, pp. 96-107
- Prabha Ramachandran and Alec
Yasinsac, "Limitations of On
Demand Secure Routing Protocols", in press IEEE Information
Assurance Workshop 2004, June 10-11, 2004
13. D. J. Scott and Alec
Yasinsac, "Dynamic Probabilistic
Rebroadcast in Ad hoc Networks", Proceedings of the International
Conference on Wireless Networks, June 21-4, 2004
14. Michael Burmester, Yvo Desmedt, Rebecca
Wright, and Alec Yasinsac, "Accountable Privacy"
Twelfth International Workshop on Security Protocols, April 26-28, 2004,
Lecture Notes in Computer Science
15. Yanet Manzano and Alec
Yasinsac, "Honeytraps, a
Valuable Tool To Provide Effective Countermeasures for Crime Against Computer
and Network Systems", Proceedings of the 7th World Multi-conference on Systemics, Cybernetics and Informatics (SCI), July 30,
2003
16. Alec Yasinsac,
"Rate of Change in Ad Hoc Networks", Proceedings of the
Information Resources Management Association International Conference, pp.
698-701, May 18-21, 2003, Philadelphia,
PA
17. John Marshall, Vikram Thakur, and Alec Yasinsac, "Identifying Flaws in
the Secure Routing Protocol", Proceedings of The 22nd International
Performance, Computing, and Communications Conference (IPCCC 2003) April
9-11, 2003, pp. 167-174
18. Mike Burmester and Alec
Yasinsac, "Protocols for a Dynamic
Key Exchange System for Ad Hoc Networks", Eleventh International
Workshop on Security Protocols, Cambridge, UK, Apr. 2-4, 2003, Lecture
Notes in Computer Science
19. Stephen Carter and Alec
Yasinsac, "Secure Position Aided Ad
hoc Routing Protocol", Proceedings of the IASTED International
Conference on Communications and Computer Networks (CCN02), pp. 329-334,
Nov. 4-6, 2002.
20. Alec Yasinsac,
Vikram Thakur, Stephen Carter, and Ilkay Cubukcu, "A Family of Protocols
for Group Key Generation in Ad Hoc Networks," Proceedings of the
IASTED International Conference on Communications and Computer Networks (CCN02),
pp. 183-187, Nov.4-6, 2002
21. Michael Burmester, Yvo Desmedt, Rebecca
Wright, and Alec Yasinsac,
"Security or Privacy, Must We Choose?" Symposium on Critical
Infrastructure Protection and the Law, Computer Science and
Telecommunication Board, October, 2002
22. Alec Yasinsac
and Yanet Manzano, "Honeytraps,
A Network Forensic Tool", Proceedings of the 6th World
Multi-conference on Systemics, Cybernetics, and
Informatics (SCI 02), July 15-19, 2002
23. Alec Yasinsac
and James A. Davis, "Modeling
Protocols for Secure Group Communication in AdHoc
Networks", 10th International Workshop, Cambridge, UK, April 17-19,
2002, Revised Papers Series: Lecture Notes in Computer Science, Christianson,
B.; Crispo, B.; Malcolm, J.A.; Roe, M. (Eds.), 2004,
VIII, 243, pp. 189-202, ISBN: 3-540-20830-5
24. Ladislav Kohout, Alec
Yasinsac, and Ernest McDuffie, "Activity Profiles for
Intrusion Detection", North American Fuzzy Information Processing
Society-Fuzzy Logic and the Internet (NAFIPS-FLINT 2002), New Orleans, LA,
pp. 463-468, June 27-29, 2002
25. Alec Yasinsac,
Marion Bogdonav, and Jennifer Frazier, "Building
An Information Security Laboratory", 6th IEEE National
Colloquium for Information Systems Security Education, Government, Industry,
and Academia, June 4, 2002
26. Justin Childs
and Alec Yasinsac, "Using
Weakest Preconditions to Evaluate the Transport Layer Security Protocol",
The Sixth IEEE International Symposium on High Assurance Systems Engineering,
pp 149-59, Boca Raton, FL, Oct 24-26, 2001.
27. Yanet Manzano and Alec
Yasinsac, "Policies to Enhance
Computer and Network Forensics", The 2nd Annual IEEE Systems, Man,
and Cybernetics Information Assurance Workshop, held at the United States Military Academy,
June 2001
28. Alec Yasinsac,
"Detecting Intrusions in Security Protocols", ACM Workshop on
Intrusion Detection, 7th ACM Conference on Computer and Communication
Security, Nov 2000
29. Alec Yasinsac,
"Dynamic Analysis of Security Protocols", Proceedings of the New
Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland
30. Alec Yasinsac
and Wm. A. Wulf, "A Framework for A Cryptographic Protocol Evaluation
Workbench", Proceedings of the Fourth IEEE International High Assur-ance Systems Engineering Symposium (HASE99), Washington D.C.,
Nov. 1999.
31. Alec Yasinsac
and Wm. A. Wulf, "Using Weakest Preconditions to Evaluate Cryptographic
Protocols", Cambridge
International Workshop on Cryptographic Protocols, March 1996.
32. Wm. A. Wulf, Alec
Yasinsac, Katie S. Oliver, and Ramesh
Peri, "Remote Authentication Without Prior
Shared Knowledge", Proceedings of the Internet Society Symposium on
Network and Distributed System Security, February 2-4, 1994, San Diego, Ca.,
pp. 159-164
Return to
top of the page
- Alec Yasinsac, “Identification: Remote
Attestation”, Wireless Sensor Network Security, Cryptology &
Information Security Series (CIS), IOS Press,
http://www.iospress.nl/html/ciss.php, estimated January 2008
- Alec Yasinsac, "Rate of Change in Ad Hoc
Networks", in Commerce and M-Commerce Technologies, Chapter # 8, pp. 166-183 , edited by Dr. Candace Deans,
July 2004, Idea Group Inc. Publishers, ISBN
1-59140-566-1
Return to top of
the page
- Alec Yasinsac,
John Kerski, David Gainey,
Michael Gerke, Kristine Amari, and Donald Newell, “Software Review and
Security Analysis of the Diebold Voting Machine Software”, TSX Supplement,
For the Florida Department of State, September 28, 2007
- Alec Yasinsac,
Breno de Medeiros, David
Gainey, John Kerski, Zachary
Hartley, Ryan Walega, and Michael Gerke, “Software and Security Review for
Elections Systems and Software iVotronic
Firmware Versions 9.1.8.0 and 9.2.0.0”, Final Report, For the
Florida Department of State, August 14, 2007
- David Gainey, Michael Gerke, and Alec Yasinsac, “Software Review and Security
Analysis of the Diebold Voting Machine Software”, Supplemental Report, For
the Florida
Department of State, August 10, 2007, http://election.dos.state.fl.us/pdf/DieboldSupplementalReportFinalSubmission.pdf
- Ryan Gardner, Alec Yasinsac,
Matt Bishop, Tadayoshi, Kohno,
Zachary Hartley, John Kerski,
David Gainey, Ryan Walega, Evan Hollander,
and Michael Gerke, “Software Review and Security Analysis of the Diebold
Voting Machine Software”, Final Report For the Florida Department of
State, July 27, 2007, http://election.dos.state.fl.us/pdf/SAITreport.pdf
- A. Yasinsac, D. Wagner, M. Bishop, T. Baker, B. de
Medeiros, G. Tyson, M. Shamos, and M. Burmester, “Software Review and
Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine
Firmware, Final Report”, Security and Assurance in Information Technology
Laboratory, Florida State University, February 23, 2007,
http://election.dos.state.fl.us/pdf/FinalAudRepSAIT.pdf.
- Tina Suen and Alec Yasinsac,
"Ad hoc Network Security: Peer Identification and Authentication
Using Signal Properties", The 6th IEEE SMC Information Assurance
Workshop, West Point, NY, June 15-17, 2005 (Poster
presentation)
- Willard Thompson, Alec
Yasinsac, and Todd MacDonald, "A Software Tamper
Resistant Mechanism Using Runtime Pathway Mappings", FSU CS
Department, October 2004, Technical Report, TR-041021, 12 pages.
- Alec Yasinsac,
Edwin A. Melendez, and Sachin Goregaoker,
“Implementing an Object Oriented, Knowledge Based Network Reference
Monitor and Intrusion Detection System”,
FSU CS Department Technical Report TR-030801, August 29, 2003, 21
pages
Return to top of
the page
Return to home page