Alec Yasinsac’s Publications


Books         Journal Articles    Conference and Workshop Articles   Book Chapters    Technical Reports


BOOKS

  1. M. Burmester and A. Yasinsac (Editors),  Mobile and AD hoc Networks and Sensors Security (MADNES 2005),  Lecture Notes in Computer Science, LNCS 4074, Springer-Verlag, Berlin Heidelberg, 2006

JOURNAL ARTICLES

  1. Alec Yasinsac and J. Todd McDonald, "Tamper Resistant Software Through Intent Protection", the International Journal of Network Security, to appear, accepted June 2007
  2. Todd Andel and Alec Yasinsac, “Surveying MANET Protocol Security Analysis”,  IEEE Communications Surveys and Tutorials, to appear, accepted April 20, 2007
  3. Todd R. Andel, Alec Yasinsac, "On the Credibility of Manet Simulations," Computer, vol. 39,  no. 7,  pp. 48-54,  July 2006
  4. Mike Burmester, Tri Le Van, and Alec Yasinsac, "Adaptive gossip protocols: Managing Redundancy and Security in Ad hoc Networks", accepted to AdHoc Networks, Elsevier, November 2004, 12 pages.
  5. Alec Yasinsac and Mike Burmester, "Centers of Academic Excellence: A Case Study", IEEE Security and Privacy Magazine, Vol. 3, Issue 1, 2005, pp. 32-35
  6. Tysen Leckie and Alec Yasinsac, "Metadata for Anomaly Based Security Protocol Attack Detection", IEEE Transactions on Knowledge and Data Engineering, Volume 16, Number 10, October 2004
  7. Alec Yasinsac and Justin Childs, "Formal Analysis of Modern Security Protocols", to appear, Information Sciences, (Elsevier) 2004.  
  8. Mike Burmester and Alec Yasinsac, "Trust Infrastructures for Wireless, Mobile Networks", WSEAS Transactions on Telecommunications, Vol. 3, #1,  January 2004, pp. 377-82
  9. Alec Yasinsac, Robert Earbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer, "Computer Forensics Education", IEEE Computer Security and Privacy Magazine, July-Aug 2003, Vol. 1, No. 4, pp. 15-23
  10. Alec Yasinsac, "An Environment for Security Protocol Intrusion Detection", Journal of Computer Security, Vol. 10, No. 1-2, 2002, pp. 177-88
  11. Alec Yasinsac, "Information Security Curricula in Computer Science Departments: Theory and Practice," The George Washington University Journal of Information Security, Volume 1, Number 2, 2002
  12. Alec Yasinsac and Wm. A. Wulf, "A Framework for A Cryptographic Protocol Evaluation Workbench", The International Journal of Reliability, Quality and Safety Engineering (IJRQSE), Vol. 8 No. 4, December 01, 2001, pp 373-89

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Alec Yasinsac and Matt Bishop, “Of Paper Trails and Voter Receipts”, to appear in Proceedings of the 41st Hawaii International Conference on System Sciences, MINITRACK: Digital Forensics – State of the Science and Foundational Research Activity, January 7-10, 2008
  2. Todd R. Andel and Alec Yasinsac, “Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols”, Electronic Notes in Theoretical Computer Science, 3rd International Workshop on Security and Trust Management (STM07), September 26-27th, 2007, Dresden, Germany
  3. Todd R. Andel and Alec Yasinsac, “Automated Security Analysis of Ad Hoc Routing Protocols”, Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, Wroclaw, Poland, July 8-9, 2007
  4. Alec Yasinsac and J. Todd McDonald, “Towards Working With Small Atomic Functions”, the Fifteenth International Workshop on Security Protocols, Brno, Czech Republic, 18-20 April 2007, LNCS (to appear)
  5. J. Todd McDonald and Alec Yasinsac, “Applications for Provably Secure Intent Protection with Bounded Input-Size Programs”, The International Conference on Availability, Reliability and Security (ARES 2007), April 10-13, 2007 (28%, 60/212)
  6. Todd Andel and Alec Yasinsac, “Invisible Node Revisited”, IEEE Southeast Conference 2007 (SoutheastCon 2007), March 22-25, 2007, pp. 686-691.
  7. J. Todd McDonald and Alec Yasinsac, "Program Intent Protection Using Circuit Encryption", 8th International Symposium on System and Information Security,           Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006 (29%, 40/140)
  8. Alec Yasinsac, “Non-Boolean Authentication", 2nd International Semantic Web Policy Workshop, Athens, Georgia, USA, Nov 6-9, 2006
  9. Todd Andel and Alec Yasinsac, "Wireless Protocol Security; to Simulate or not Simulate", Symposium on Simulation Software and Security, affiliated with the 2006 Spring Simulation Multi-conference (SpringSim06), Von Braun Center, Huntsville, Alabama, April 2-6, 2006
  10. Alec Yasinsac and J. Todd McDonald, "Security-Aware Coding", 39th Annual Hawaii International Conference On System Sciences, Mini-track on Information Security Education and Foundational Research, Jan. 4-7, 2006
  11. Tina Suen and Alec Yasinsac, "Peer Identification in Wireless Sensor Networks Using Signal Properties", Proceedings of the 2005 IEEE Workshop on Wireless and Sensor Network Security, Nov. 7-10, 2005, Washington DC
  12. Alec Yasinsac and J. Todd McDonald, "Of Unicorns and Random Programs", The Third IASTED International Conference on Communications and Computer Networks, (CCN 2005), October 24-26, 2005, Marina del Rey, CA, USA
  13. Tina Suen and Alec Yasinsac, "Peer Identification in Wireless Sensor Networks Using Signal Properties", 2005 IEEE Workshop on Wireless and Sensor Network Security, Nov. 7-10, Washington DC
  14. J. Todd McDonald and Alec Yasinsac, "Application Security Models for Mobile Agent Systems", Proceedings of the 1st International Workshop on Security and Trust Management, Electronic Notes in Theoretical Computer Science, September 15, 2005, 25% acceptance (9/36)
  15. Mike Burmester, Breno DeMederios, and Alec Yasinsac, "Community-centric vanilla-rollback access, or: How I stopped worrying and learned to love my computer", to appear Thirteenth International Workshop on Security Protocols, April 20-22, 2005, LNCS
  16. Willard Thompson, Alec Yasinsac, and Todd McDonald, "Semantic Encryption Transformation Scheme", Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, September 15-17, 2004, pp. 516-21
  17. Todd McDonald, Alec Yasinsac, and Willard Thompson, "Mobile Agent Data Integrity Using Multi-agent Architecture", in press in the Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, September 15-17, 2004, pp. 536-42
  18. Mike Burmester, Tri Le Van, and Alec Yasinsac, "Weathering the Storm: Managing Redundancy and Security in Ad hoc Networks ", 3rd International Conference on AD-HOC Networks & Wireless, July 20-22, 2004, LNCS 3158, Springer, pp. 96-107
  19. Prabha Ramachandran and Alec Yasinsac, "Limitations of On Demand Secure Routing Protocols", in press IEEE Information Assurance Workshop 2004, June 10-11, 2004

13.  D. J. Scott and Alec Yasinsac, "Dynamic Probabilistic Rebroadcast in Ad hoc Networks", Proceedings of the International Conference on Wireless Networks, June 21-4, 2004

14.  Michael Burmester, Yvo Desmedt, Rebecca Wright, and Alec Yasinsac, "Accountable Privacy" Twelfth International Workshop on Security Protocols, April 26-28, 2004, Lecture Notes in Computer Science

15.  Yanet Manzano and Alec Yasinsac, "Honeytraps, a Valuable Tool To Provide Effective Countermeasures for Crime Against Computer and Network Systems", Proceedings of the 7th World Multi-conference on Systemics, Cybernetics and Informatics (SCI), July 30, 2003

16.  Alec Yasinsac, "Rate of Change in Ad Hoc Networks", Proceedings of the Information Resources Management Association International Conference, pp. 698-701, May 18-21, 2003, Philadelphia, PA

17.  John Marshall, Vikram Thakur, and Alec Yasinsac, "Identifying Flaws in the Secure Routing Protocol", Proceedings of The 22nd International Performance, Computing, and Communications Conference (IPCCC 2003) April 9-11, 2003, pp. 167-174

18.  Mike Burmester and Alec Yasinsac, "Protocols for a Dynamic Key Exchange System for Ad Hoc Networks", Eleventh International Workshop on Security Protocols, Cambridge, UK, Apr. 2-4, 2003, Lecture Notes in Computer Science

19.  Stephen Carter and Alec Yasinsac, "Secure Position Aided Ad hoc Routing Protocol", Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 329-334, Nov. 4-6, 2002.

20.  Alec Yasinsac, Vikram Thakur, Stephen Carter, and Ilkay Cubukcu, "A Family of Protocols for Group Key Generation in Ad Hoc Networks," Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 183-187, Nov.4-6, 2002

21.  Michael Burmester, Yvo Desmedt, Rebecca Wright, and Alec Yasinsac, "Security or Privacy, Must We Choose?" Symposium on Critical Infrastructure Protection and the Law, Computer Science and Telecommunication Board, October, 2002

22.  Alec Yasinsac and Yanet Manzano, "Honeytraps, A Network Forensic Tool", Proceedings of the 6th World Multi-conference on Systemics, Cybernetics, and Informatics (SCI 02), July 15-19, 2002

23.  Alec Yasinsac and James A. Davis, "Modeling Protocols for Secure Group Communication in AdHoc Networks", 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Series: Lecture Notes in Computer Science, Christianson, B.; Crispo, B.; Malcolm, J.A.; Roe, M. (Eds.), 2004, VIII, 243, pp. 189-202, ISBN: 3-540-20830-5

24.  Ladislav Kohout, Alec Yasinsac, and Ernest McDuffie, "Activity Profiles for Intrusion Detection", North American Fuzzy Information Processing Society-Fuzzy Logic and the Internet (NAFIPS-FLINT 2002), New Orleans, LA, pp. 463-468, June 27-29, 2002

25.  Alec Yasinsac, Marion Bogdonav, and Jennifer Frazier, "Building An Information Security Laboratory", 6th IEEE National Colloquium for Information Systems Security Education, Government, Industry, and Academia, June 4, 2002

26.  Justin Childs and Alec Yasinsac, "Using Weakest Preconditions to Evaluate the Transport Layer Security Protocol", The Sixth IEEE International Symposium on High Assurance Systems Engineering, pp 149-59, Boca Raton, FL, Oct 24-26, 2001.

27.  Yanet Manzano and Alec Yasinsac, "Policies to Enhance Computer and Network Forensics", The 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, held at the United States Military Academy, June 2001

28.  Alec Yasinsac, "Detecting Intrusions in Security Protocols", ACM Workshop on Intrusion Detection, 7th ACM Conference on Computer and Communication Security, Nov 2000

29.  Alec Yasinsac, "Dynamic Analysis of Security Protocols", Proceedings of the New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland

30.  Alec Yasinsac and Wm. A. Wulf, "A Framework for A Cryptographic Protocol Evaluation Workbench", Proceedings of the Fourth IEEE International High Assur-ance Systems Engineering Symposium (HASE99), Washington D.C., Nov. 1999.

31.  Alec Yasinsac and Wm. A. Wulf, "Using Weakest Preconditions to Evaluate Cryptographic Protocols", Cambridge International Workshop on Cryptographic Protocols, March 1996.

32.  Wm. A. Wulf, Alec Yasinsac, Katie S. Oliver, and Ramesh Peri, "Remote Authentication Without Prior Shared Knowledge", Proceedings of the Internet Society Symposium on Network and Distributed System Security, February 2-4, 1994, San Diego, Ca., pp. 159-164

 

Return to top of the page


BOOK CHAPTERS

  1. Alec Yasinsac, “Identification: Remote Attestation”, Wireless Sensor Network Security, Cryptology & Information Security Series (CIS), IOS Press, http://www.iospress.nl/html/ciss.php, estimated January 2008
  2. Alec Yasinsac, "Rate of Change in Ad Hoc Networks", in Commerce and M-Commerce Technologies, Chapter # 8, pp166-183 , edited by Dr. Candace Deans, July 2004, Idea Group Inc. Publishers, ISBN 1-59140-566-1

 

Return to top of the page


Technical Reports

  1. Alec Yasinsac, John Kerski, David Gainey, Michael Gerke, Kristine Amari, and Donald Newell, “Software Review and Security Analysis of the Diebold Voting Machine Software”, TSX Supplement, For the Florida Department of State, September 28, 2007
  2. Alec Yasinsac, Breno de Medeiros, David Gainey, John Kerski, Zachary Hartley, Ryan Walega, and Michael Gerke, “Software and Security Review for Elections Systems and Software iVotronic  Firmware Versions 9.1.8.0 and 9.2.0.0”, Final Report, For the Florida Department of State, August 14, 2007
  3. David Gainey, Michael Gerke, and Alec Yasinsac, “Software Review and Security Analysis of the Diebold Voting Machine Software”, Supplemental Report, For the Florida Department of State, August 10, 2007, http://election.dos.state.fl.us/pdf/DieboldSupplementalReportFinalSubmission.pdf
  4. Ryan Gardner, Alec Yasinsac, Matt Bishop, Tadayoshi, Kohno, Zachary Hartley, John Kerski, David Gainey, Ryan Walega, Evan Hollander, and Michael Gerke, “Software Review and Security Analysis of the Diebold Voting Machine Software”, Final Report For the Florida Department of State, July 27, 2007, http://election.dos.state.fl.us/pdf/SAITreport.pdf
  5. A. Yasinsac, D. Wagner, M. Bishop, T. Baker, B. de Medeiros, G. Tyson, M. Shamos, and M. Burmester, “Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware, Final Report”, Security and Assurance in Information Technology Laboratory, Florida State University, February 23, 2007, http://election.dos.state.fl.us/pdf/FinalAudRepSAIT.pdf.
  6. Tina Suen and Alec Yasinsac, "Ad hoc Network Security: Peer Identification and Authentication Using Signal Properties", The 6th IEEE SMC Information Assurance Workshop, West Point, NY, June 15-17, 2005 (Poster presentation)
  7. Willard Thompson, Alec Yasinsac, and Todd MacDonald, "A Software Tamper Resistant Mechanism Using Runtime Pathway Mappings", FSU CS Department, October 2004, Technical Report, TR-041021, 12 pages.
  8. Alec Yasinsac, Edwin A. Melendez, and Sachin Goregaoker, “Implementing an Object Oriented, Knowledge Based Network Reference Monitor and Intrusion Detection System”,  FSU CS Department Technical Report TR-030801, August 29, 2003, 21 pages

 

Return to top of the page


Return to home page