Alec Yasinsac’s
Publications
- M. Burmester and A.
Yasinsac (Editors), Mobile and AD hoc Networks and Sensors Security
(MADNES 2005), Lecture Notes in Computer Science, LNCS 4074,
Springer-Verlag, Berlin Heidelberg, 2006
- Alec
Yasinsac and Cynthia Irvine, "Is there a Trustworthy Systems Doctor
in the House?", IEEE Security and Privacy Magazine, Vol. 11, No. 1,
Jan-Feb 2013
- Todd
R. Andel, Greg Back, and Alec Yasinsac, "Automating the Security
Analysis Process of Secure Ad Hoc Routing," Simulation Modelling
Practice and Theory, vol. 19, no. 9 (October 2011), pp. 2032-2049
- Yasinsac,
A, and Pardue, H, in press, "Voting System Risk Assessment: A Process
Using Threat Trees," Journal of Information Systems Applied Research,
Vol. 4, Issue #1, 2011, http://jisar.org/
- Alec
Yasinsac and Matt Bishop, “The Dynamics of Counting and Recounting Votes”,
IEEE Security and Privacy Magazine, May-June 2008, Volume: 6, Issue: 3,
pp. 22-29
- Todd
McDonald, Yong C. Kim, and Alec Yasinsac, “Software Issues in Digital
Forensics,” ACM Operating Systems Review, Volume 42 Issue 3,
April 2008
- Alec
Yasinsac and J. Todd McDonald, "Tamper Resistant Software Through
Intent Protection", the International Journal of Network Security,
Vol. 7, No. 3, pp. 370-382
- Todd
Andel and Alec Yasinsac, “Surveying MANET Protocol Security
Analysis”, IEEE Communications Surveys, 4th Quarter 2007, Volume 9,
No. 4, pp. 70-84
- Todd
R. Andel, Alec Yasinsac, "On the Credibility of Manet
Simulations," Computer, vol. 39, no. 7, pp. 48-54,
July 2006
- Mike
Burmester, Tri Le Van, and Alec Yasinsac, "Adaptive gossip protocols:
Managing Redundancy and Security in Ad hoc Networks", accepted to AdHoc Networks, Elsevier, November 2004, 12 pages.
- Alec
Yasinsac and Mike Burmester, "Centers of Academic Excellence: A Case
Study", IEEE Security and Privacy Magazine, Vol. 3, Issue 1, 2005,
pp. 32-35
- Tysen Leckie and Alec Yasinsac, "Metadata for
Anomaly Based Security Protocol Attack Detection", IEEE
Transactions on Knowledge and Data Engineering, Volume 16, Number 10,
October 2004
- Alec Yasinsac and Justin Childs, "Formal Analysis
of Modern Security Protocols", Information Sciences,
(Elsevier) 2004.
- Mike Burmester and Alec Yasinsac, "Trust
Infrastructures for Wireless, Mobile Networks", WSEAS Transactions on
Telecommunications, Vol. 3, #1, January 2004, pp. 377-82
- Alec Yasinsac, Robert Earbacher,
Donald G. Marks, Mark Pollitt, Peter M. Sommer, "Computer Forensics
Education", IEEE Computer Security and Privacy Magazine,
July-Aug 2003, Vol. 1, No. 4, pp. 15-23
- Alec Yasinsac, "An Environment for Security
Protocol Intrusion Detection", Journal of Computer Security,
Vol. 10, No. 1-2, 2002, pp. 177-88
- Alec Yasinsac, "Information Security Curricula in
Computer Science Departments: Theory and Practice,"
The George Washington University Journal of Information
Security, Volume 1, Number 2, 2002
- Alec Yasinsac and Wm. A. Wulf, "A Framework for A
Cryptographic Protocol Evaluation Workbench", The International
Journal of Reliability, Quality and Safety Engineering (IJRQSE), Vol.
8 No. 4, December 01, 2001, pp 373-89
Return
to top of the page
- Mark
Yampolskiy, Lena Schuetzle, Uday Vaidya and Alec
Yasinsac, "Security Challenges for Additive Layer Manufacturing with
Metallic Alloys", The Ninth Annual IFIP Working Group 11.10
International Conference on Critical Infrastructure Protection SRI
International Arlington, Virginia, USA, March 16 - 18, 2015
- Mark
Yampolskiy, William Glisson, and Alec Yasinsac, "Intellectual
Property Protection in Additive Layer Manufacturing: Requirements for
Secure Outsourcing", The 4th Program Protection and Reverse
Engineering Workshop (PPREW-4), New Orleans, LA., December 14, 2014
- Alec
Yasinsac, "Independent Computations for Safe Remote Electronic Voting",
Security Protocols XXI, 21st International Workshop, March 18-20th, 2013,
Sidney Sussex College, Cambridge, UK, LNCS 8263, ISBN 978-3-642-41716-0
- Alec
Yasinsac, "A Model For Managing System Insiders", the Hawaii
International Conference on System Sciences (HICSS-46), 7-10 January, 2013
- Todd
Andel and Alec Yasinsac, "Secure Internet Voting Protocol for
Overseas Military Voters", the Twentieth International Workshop on
Security Protocols, April 11-13th, 2012 at Sidney Sussex College,
Cambridge, UK, LNCS (in press)
- Alec
Yasinsac, "Did Your Mailed Ballot Count: The Unrecognized
Unreliability of Voting By Mail," The 9th International Conference on
Politics and Information Systems, Technologies and Applications: PISTA
2011, Orlando, Florida, July 19th - July 22nd, 2011
- Alec
Yasinsac, "Comparative Risk Analysis: Using Technology to Make
Military Members First Class Voters," 2nd International Conference on
Society and Information Technologies: ICSIT 2011, Orlando, Florida, March
27-30, 2011
- Alec
Yasinsac, "Insider Threats to Voting Systems," Workshop on
Governance of Technology, Information, and Policies (GTIP), December 7,
2010
- J.
Harold Pardue and Alec Yasinsac, "Voting System Risk Assessment Using
Threat Trees," accepted to the 2010 Conference on Information Systems
Applied Research, October 28-31, 2010
- J.
Harold Pardue, Alec Yasinsac, and Jeffrey P. Landry, "Towards
Internet Voting Security: A Threat Tree for Risk Assessment,"
accepted to the International Conference on Risks and Security of Internet
and Systems 2010, October 10-13, 2010
- Mike
Burmester, Prasanta Das, Martin Edwards, and
Alec Yasinsac, "Multi-Domain Trust Management in Variable Threat
Environments - A User-Centric Model", MILCOM 2009, October 18–21,
2009, Boston, MA USA
- Harold
Pardue, Jeff Landry, and Alec Yasinsac, "A Risk Assessment Model for
Voting Systems using Threat Trees and Monte Carlo Simulation", First
International Workshop on Requirements Engineering for E-voting Systems,
Atlanta, Georgia, USA Monday, August 31st, 2009
- Sean
Piesert, Matt Bishop, and Alec Yasinsac,
"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic
Voting Machines," 42st Hawaii International Conference on System
Sciences, January 5-8, 2009
- Mike
Burmester, Prasanta Das, Martin Edwards, and
Alec Yasinsac, "Domain Trust Management in Variable-Threat
Environments Using Rollback-Access", MILCOM 2008, San Diego,
California, November 17-19, 2008
- T.
R. Andel and A. Yasinsac, "Automated Evaluation of Secure Route
Discovery in MANET Protocols", in 15th International SPIN Workshop on
Model Checking of Software (SPIN 2008), LNCS 5156, Springer-Verlag, 2008, pp. 26-41.
- Alec
Yasinsac and Matt Bishop, “Of Paper Trails and Voter Receipts”, in
Proceedings of the 41st Hawaii International Conference on System
Sciences, MINITRACK: Digital Forensics – State of the Science and
Foundational Research Activity, January 7-10, 2008
- Mike
Burmester, Breno DeMederios,
and Alec Yasinsac, "Community-centric vanilla-rollback access, or:
How I stopped worrying and learned to love my computer", Security
Protocols 13th International Workshop, LNCS 4631, pp. 228-244, November
15, 2007
- Todd
R. Andel and Alec Yasinsac, “Adaptive Threat Modeling for Secure Ad Hoc
Routing Protocols”, Electronic Notes in Theoretical Computer Science, 3rd
International Workshop on Security and Trust Management (STM07), September
26-27th, 2007, Dresden, Germany
- Todd
R. Andel and Alec Yasinsac, “Automated Security Analysis of Ad Hoc Routing
Protocols”, Workshop on Foundations of Computer Security and Automated
Reasoning for Security Protocol Analysis, Wroclaw, Poland, July 8-9, 2007
- Alec
Yasinsac and J. Todd McDonald, “Towards Working With Small Atomic
Functions”, the Fifteenth International Workshop on Security Protocols,
Brno, Czech Republic, 18-20 April 2007, LNCS
- J.
Todd McDonald and Alec Yasinsac, “Applications for Provably Secure Intent
Protection with Bounded Input-Size Programs”, The International Conference
on Availability, Reliability and Security (ARES 2007), April 10-13, 2007
(28%, 60/212)
- Todd
Andel and Alec Yasinsac, “Invisible Node Revisited”, IEEE Southeast
Conference 2007 (SoutheastCon 2007), March
22-25, 2007, pp. 686-691.
- J.
Todd McDonald and Alec Yasinsac, "Program Intent Protection Using
Circuit Encryption", 8th International Symposium on System and
Information Security, Sao Jose dos Campos, Sao Paulo, Brazil, November
8-10, 2006 (29%, 40/140)
- Alec
Yasinsac, “Non-Boolean Authentication", 2nd International Semantic
Web Policy Workshop, Athens, Georgia, USA, Nov 6-9, 2006
- Todd
Andel and Alec Yasinsac, "Wireless Protocol Security; to Simulate or
not Simulate", Symposium on Simulation Software and Security,
affiliated with the 2006 Spring Simulation Multi-conference (SpringSim06),
Von Braun Center, Huntsville, Alabama, April 2-6, 2006
- Alec
Yasinsac and J. Todd McDonald, "Security-Aware Coding", 39th
Annual Hawaii International Conference On System Sciences, Mini-track on
Information Security Education and Foundational Research, Jan. 4-7, 2006
- Tina
Suen and Alec Yasinsac, "Peer Identification in Wireless Sensor
Networks Using Signal Properties", Proceedings of the 2005 IEEE
Workshop on Wireless and Sensor Network Security, Nov. 7-10, 2005,
Washington DC
- Alec
Yasinsac and J. Todd McDonald, "Of Unicorns and Random
Programs", The Third IASTED International Conference on
Communications and Computer Networks, (CCN 2005), October 24-26, 2005,
Marina del Rey, CA, USA
- Tina
Suen and Alec Yasinsac, "Peer Identification in Wireless Sensor
Networks Using Signal Properties", 2005 IEEE Workshop on Wireless and
Sensor Network Security, Nov. 7-10, Washington DC
- J.
Todd McDonald and Alec Yasinsac, "Application Security Models for
Mobile Agent Systems", Proceedings of the 1st International Workshop
on Security and Trust Management, Electronic Notes in Theoretical Computer
Science, September 15, 2005, 25% acceptance (9/36)
- Mike
Burmester, Breno DeMederios,
and Alec Yasinsac, "Community-centric vanilla-rollback access, or:
How I stopped worrying and learned to love my computer", Thirteenth
International Workshop on Security Protocols, April 20-22, 2005, LNCS
- Willard
Thompson, Alec Yasinsac, and Todd McDonald, "Semantic Encryption
Transformation Scheme", Proceedings of the 2004 International
Workshop on Security in Parallel and Distributed Systems, San
Francisco, CA, September 15-17, 2004, pp. 516-21
- Todd
McDonald, Alec Yasinsac, and Willard Thompson, "Mobile Agent Data
Integrity Using Multi-agent Architecture", in the Proceedings of
the 2004 International Workshop on Security in Parallel and Distributed
Systems, San Francisco, CA, September 15-17, 2004, pp. 536-42
- Mike
Burmester, Tri Le Van, and Alec Yasinsac, "Weathering the Storm:
Managing Redundancy and Security in Ad hoc Networks ", 3rd
International Conference on AD-HOC Networks & Wireless, July
20-22, 2004, LNCS 3158, Springer, pp. 96-107
- Prabha Ramachandran and Alec Yasinsac, "Limitations of On
Demand Secure Routing Protocols", IEEE Information
Assurance Workshop 2004, June 10-11, 2004
- D.
J. Scott and Alec Yasinsac, "Dynamic
Probabilistic Rebroadcast in Ad hoc Networks", Proceedings of the
International Conference on Wireless Networks, June 21-4, 2004
- Michael
Burmester, Yvo Desmedt, Rebecca Wright, and Alec
Yasinsac, "Accountable
Privacy" Twelfth International Workshop on Security Protocols,
April 26-28, 2004, Lecture Notes in Computer Science
- Yanet Manzano and Alec Yasinsac,
"Honeytraps, a Valuable Tool To Provide
Effective Countermeasures for Crime Against Computer and Network
Systems", Proceedings of the 7th World Multi-conference on Systemics, Cybernetics and Informatics (SCI), July
30, 2003
- Alec
Yasinsac, "Rate of Change in Ad Hoc Networks", Proceedings of
the Information Resources Management Association International Conference,
pp. 698-701, May 18-21, 2003, Philadelphia , PA
- John
Marshall, Vikram Thakur, and Alec Yasinsac,
"Identifying
Flaws in the Secure Routing Protocol", Proceedings of The 22nd
International Performance, Computing, and Communications Conference
(IPCCC 2003) April 9-11, 2003, pp. 167-174
- Mike
Burmester and Alec Yasinsac, "Protocols for a
Dynamic Key Exchange System for Ad Hoc Networks", Eleventh
International Workshop on Security Protocols, Cambridge, UK, Apr. 2-4,
2003, Lecture Notes in Computer Science
- Stephen
Carter and Alec Yasinsac, "Secure Position
Aided Ad hoc Routing Protocol", Proceedings of the IASTED
International Conference on Communications and Computer Networks (CCN02),
pp. 329-334, Nov. 4-6, 2002.
- Alec
Yasinsac, Vikram Thakur, Stephen Carter, and
Ilkay Cubukcu, "A Family of
Protocols for Group Key Generation in Ad Hoc Networks,"
Proceedings of the IASTED International Conference on Communications
and Computer Networks (CCN02), pp. 183-187, Nov.4-6, 2002
- Michael
Burmester, Yvo Desmedt, Rebecca Wright, and Alec
Yasinsac, "Security or Privacy, Must We Choose?" Symposium on
Critical Infrastructure Protection and the Law, Computer Science and
Telecommunication Board, October, 2002
- Alec
Yasinsac and Yanet Manzano,
"Honeytraps, A Network Forensic Tool",
Proceedings of the 6th World Multi-conference on Systemics, Cybernetics,
and Informatics (SCI 02), July 15-19, 2002
- Alec
Yasinsac and James A. Davis, "Modeling Protocols
for Secure Group Communication in AdHoc Networks",
10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised
Papers Series: Lecture Notes in Computer Science, Christianson, B.; Crispo, B.; Malcolm, J.A.; Roe, (Eds.), 2004, VIII,
243, pp. 189-202, ISBN: 3-540-20830-5
- Ladislav Kohout, Alec Yasinsac, and
Ernest McDuffie, "Activity Profiles for Intrusion Detection", North
American Fuzzy Information Processing Society-Fuzzy Logic and the Internet
(NAFIPS-FLINT 2002), New Orleans, LA, pp. 463-468, June 27-29, 2002
- Alec
Yasinsac, Marion Bogdonav, and Jennifer Frazier,
"Building An Information Security Laboratory", 6th IEEE
National Colloquium for Information Systems Security Education, Government,
Industry, and Academia, June 4, 2002
- Justin
Childs and Alec Yasinsac, "Using Weakest Preconditions to Evaluate
the Transport Layer Security Protocol", The Sixth IEEE International
Symposium on High Assurance Systems Engineering, pp 149-59, Boca Raton,
FL, Oct 24-26, 2001.
- Yanet Manzano and Alec Yasinsac,
"Policies to Enhance Computer and Network Forensics", The 2nd
Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop,
held at the United States Military Academy, June 2001
- Alec
Yasinsac, "Detecting Intrusions in Security Protocols", ACM
Workshop on Intrusion Detection, 7th ACM Conference on Computer and
Communication Security, Nov 2000
- Alec
Yasinsac, "Dynamic Analysis of Security Protocols", Proceedings
of the New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland
- Alec
Yasinsac and Wm. A. Wulf, "A Framework for A Cryptographic Protocol
Evaluation Workbench", Proceedings of the Fourth IEEE
International High Assur-ance Systems
Engineering Symposium (HASE99), Washington D.C., Nov. 1999.
- Alec
Yasinsac and Wm. A. Wulf, "Using Weakest Preconditions to Evaluate
Cryptographic Protocols", Cambridge International Workshop on
Cryptographic Protocols, March 1996.
- Wm.
A. Wulf, Alec Yasinsac, Katie S. Oliver, and Ramesh Peri, "Remote
Authentication Without Prior Shared Knowledge", Proceedings of the
Internet Society Symposium on Network and Distributed System Security,
February 2-4, 1994, San Diego, Ca., pp. 159-164
Return to top of the page
- Alec Yasinsac,
“Identification: Remote Attestation”, Wireless Sensor Network Security,
Cryptology & Information Security Series (CIS), IOS Press,
http://www.iospress.nl/html/ciss.php, estimated January 2008
- Alec Yasinsac,
"Rate of Change in Ad Hoc Networks", in Commerce and M-Commerce
Technologies, Chapter # 8, pp. 166-183 , edited by Dr. Candace
Deans, July 2004, Idea Group Inc. Publishers, ISBN 1-59140-566-1
Return to top of the page
- Alec
Yasinsac, “Precision In Elections: Extracting a Precise Result from an
Imprecise Process,” the International Journal of Critical Infrastructure
Protection, Elsevier, October 2012, http://dx.doi.org/10.1016/j.ijcip.2012.09.002
- Alec
Yasinsac, "The Military's Obligation to Military Voters: A Position
Paper for the NIST 2010 UOCAVA Remote Voting Systems Workshop",
Workshop on UOCAVA Remote Voting Systems, Washington, DC, August 6-7,
2010, http://www.nist.gov/itl/csd/ct/uocava_workshop_aug2010.cfm
- Richard
Benham, Alec Yasinsac, and Jeremy Epstein, "Limited Proxy Voting as
an Alternative to use of Complex Systems for UOCAVA voters", Workshop
on UOCAVA Remote Voting Systems, Washington, DC, August 6-7, 2010, http://www.nist.gov/itl/csd/ct/uocava_workshop_aug2010.cfm
- Alec
Yasinsac, Robert B. Sweeney, Ph.D., J. Harold Pardue, Ph.D., Jeffrey P.
Landry, Ph.D., LisaAnn Z. Benham, Richard M.
Benham, Jeremy J. Epstein, Paul Lux, E. John Sebes, and Ion Sancho,
"Elections Operations Assessment," in press March 16, 2010
- Michael
Black and Alec Yasinsac, "Embedded Forensic Information", ARO
Workshop on Digital Forensics, Washington D.C., Sept. 10-11, 2009
- Alec
Yasinsac, written testimony the U.S. House of Representatives, Committee
of House Administration, Voting Subcommittee hearing on "Military and
Overseas voting, Problems and potential solutions", May 21, 2009, http://cha.house.gov/view_hearing.aspx?r=50
- Alec
Yasinsac, Testimony before the U.S. Elections Assistance Commission
Interdisciplinary Roundtable Discussion of TGDC Proposed Voluntary
Voting System Guidelines, May 5, 2008
- Alec
Yasinsac, Written testimony to the U.S. Elections Assistance Commission
Interdisciplinary Roundtable Discussion of TGDC Proposed Voluntary
Voting System Guidelines, May 5, 2008,
http://www.eac.gov/News/docs/testimony_alec_yasinsac_fsu/attachment_download/file
- Kristine
Amari, Ryan Gardner, Brian Hay, John Kerski,
Kara L. Nance, and Alec Yasinsac, “Software Review and Security Analysis
of the Diebold Voting Machine Software, Premier TSx
Version 4.7.1 Supplement”, Security and Assurance in Information
Technology Laboratory, Florida State University, December 19, 2007, for
the Florida Department of State
- Alec
Yasinsac, John Kerski, David Gainey, Michael Gerke, Kristine Amari, and Donald Newell, “Software
Review and Security Analysis of the Diebold Voting Machine Software”, TSX
Supplement, For the Florida Department of State, September 28, 2007
- Alec
Yasinsac, Breno de Medeiros , David Gainey, John
Kerski, Zachary Hartley, Ryan Walega, and Michael Gerke,
“Software and Security Review for Elections Systems and Software
iVotronic Firmware Versions 9.1.8.0 and 9.2.0.0”, Final Report, For
the Florida Department of State, August 14, 2007
- David
Gainey, Michael Gerke, and Alec Yasinsac,
“Software Review and Security Analysis of the Diebold Voting Machine
Software”, Supplemental Report, For the Florida Department of State,
August 10, 2007, http://election.dos.state.fl.us/pdf/DieboldSupplementalReportFinalSubmission.pdf
- Ryan
Gardner, Alec Yasinsac, Matt Bishop, Tadayoshi, Kohno, Zachary Hartley,
John Kerski, David Gainey, Ryan Walega, Evan Hollander, and Michael Gerke,
“Software Review and Security Analysis of the Diebold Voting Machine
Software”, Final Report For the Florida Department of State, July 27,
2007, http://election.dos.state.fl.us/pdf/SAITreport.pdf
- A.
Yasinsac, D. Wagner, M. Bishop, T. Baker, B. de Medeiros, G. Tyson, M.
Shamos, and M. Burmester, “Software Review and Security Analysis of the
ES&S iVotronic 8.0.1.2 Voting Machine Firmware, Final Report”,
Security and Assurance in Information Technology Laboratory, Florida State
University, February 23, 2007,
http://election.dos.state.fl.us/pdf/FinalAudRepSAIT.pdf.
- Tina
Suen and Alec Yasinsac, "Ad hoc Network Security: Peer Identification
and Authentication Using Signal Properties", The 6th IEEE SMC Information
Assurance Workshop, West Point, NY, June 15-17, 2005 (Poster presentation)
- Willard
Thompson, Alec Yasinsac, and Todd MacDonald, "A Software Tamper
Resistant Mechanism Using Runtime Pathway Mappings", FSU CS
Department, October 2004, Technical Report, TR-041021, 12 pages.
- Alec
Yasinsac, Edwin A. Melendez, and Sachin Goregaoker, “Implementing an
Object Oriented, Knowledge Based Network Reference Monitor and Intrusion
Detection System”, FSU CS Department Technical Report TR-030801,
August 29, 2003, 21 pages
- Alec
Yasinsac, “A Formal Semantics for Evaluating Cryptographic Protocols”, Ph.D. Dissertation, University of
Virginia, January 1996, Department of Computer Science, University of
Virginia, Advisor: William A. Wulf, http://libra.virginia.edu/catalog/libra-oa:313
Return to top of the page
Return
to home page