Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("YASINSAC, Alec")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 28

  • Page / 2
Export

Selection :

  • and

Help! Is There a Trustworthy-Systems Doctor in the House?YASINSAC, Alec; IRVINE, Cynthia.IEEE security & privacy. 2013, Vol 11, Num 1, pp 73-77, issn 1540-7993, 5 p.Article

On the credibility of manet simulationsANDEL, Todd R; YASINSAC, Alec.Computer (Long Beach, CA). 2006, Vol 39, Num 7, pp 48-54, issn 0018-9162, 7 p.Article

Secure mobile ad-hoc networks and sensors (First international workshop, MADNES 2005, Singapore, September 20-22, 2005)Burmester, Mike; Yasinsac, Alec.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-36646-6, 1Vol, X-191 p, isbn 3-540-36646-6Conference Proceedings

Hybrid approach for secure mobile agent computationsMCDONALD, J. Todd.Lecture notes in computer science. 2006, pp 38-53, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 16 p.Conference Paper

Dark encounter computations : (and musings on biological networks) (extended abstract)PERALTA, René.Lecture notes in computer science. 2006, pp 182-185, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 4 p.Conference Paper

An XML standards based authorization framework for mobile agentsNAVARRO, G; BORRELL, J.Lecture notes in computer science. 2006, pp 54-66, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 13 p.Conference Paper

Keynote : Efficient cryptographic techniques for mobile ad-hoc networksYULIANG ZHENG.Lecture notes in computer science. 2006, issn 0302-9743, isbn 3-540-36646-6, 1Vol, p. 117Conference Paper

Fair authentication in pervasive computingJUN LI; CHRISTIANSON, Bruce; LOOMES, Martin et al.Lecture notes in computer science. 2006, pp 132-143, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 12 p.Conference Paper

How to generate universally verifiable signatures in ad-hoc networks (extended abstract)LEE, Kyungkeun; OH, Joonghyo; MOON, Sangjae et al.Lecture notes in computer science. 2006, pp 118-131, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 14 p.Conference Paper

Key management for mobile sensor networksSANCHEZ SANCHEZ, David; BALDUS, Heribert.Lecture notes in computer science. 2006, pp 14-26, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 13 p.Conference Paper

Detecting impersonation attacks in future wireless and mobile networksBARBEAU, Michel; HALL, Jyanthi; KRANAKIS, Evangelos et al.Lecture notes in computer science. 2006, pp 80-95, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 16 p.Conference Paper

Security analysis and improvement of return routability protocolYING QIU; JIANYING ZHOU; DENG, Robert et al.Lecture notes in computer science. 2006, pp 174-181, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 8 p.Conference Paper

ARMS : An authenticated routing message in sensor networksLEE, Suk-Bok; CHOI, Yoon-Hwa.Lecture notes in computer science. 2006, pp 158-173, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 16 p.Conference Paper

Software Issues in Digital ForensicsMCDONALD, J. Todd; KIM, Yong C; YASINSAC, Alec et al.Operating systems review. 2008, Vol 42, Num 3, pp 29-40, issn 0163-5980, 12 p.Article

Weathering the storm: Managing redundancy and security in ad hoc networksBURMESTER, Mike; TRI VAN LE; YASINSAC, Alec et al.Lecture notes in computer science. 2004, pp 96-107, issn 0302-9743, isbn 3-540-22543-9, 12 p.Conference Paper

Server-aided RSA key generation against collusion attackYUN CHEN; SAFAVI-NAINI, Reihaneh; BAEK, Joonsang et al.Lecture notes in computer science. 2006, pp 27-37, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 11 p.Conference Paper

Anonymous distribution of encryption keys in cellular broadcast systemsCICHON, Jacek; KRZYWIECKI, Lukasz; KUTYŁOWSKI, Miroslaw et al.Lecture notes in computer science. 2006, pp 96-109, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 14 p.Conference Paper

Cryptanalysis of the energy efficient stream ciphers SSC2YUNYI LIU; TUANFA QIN; WANSUN NI et al.Lecture notes in computer science. 2006, pp 144-157, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 14 p.Conference Paper

Distributed data mining protocols for privacy : A review of some recent resultsWRIGHT, Rebecca N; ZHIQIANG YANG; SHENG ZHONG et al.Lecture notes in computer science. 2006, pp 67-79, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 13 p.Conference Paper

Non-group cellular automata based one time password authentication scheme in wireless networksJEON, Jun-Cheol; KIM, Kee-Won; YOO, Kee-Young et al.Lecture notes in computer science. 2006, pp 110-116, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 7 p.Conference Paper

Protocols for supporting a Public Key infrastructure in ad hoc networks. Commentary. Authors' replyBURMESTER, Mike; YASINSAC, Alec; STAJANO, Frank et al.Lecture notes in computer science. 2005, pp 274-287, issn 0302-9743, isbn 3-540-28389-7, 14 p.Conference Paper

Modeling protocols for secure group communications in Ad hoc networksYASINSAC, Alec; DAVIS, James A; WHEELER, David et al.Lecture notes in computer science. 2003, pp 189-202, issn 0302-9743, isbn 3-540-20830-5, 14 p.Conference Paper

A novel pairwise key predistribution scheme for ubiquitous sensor networkJONG SOU PARK; MOHAMMED GOLAM SADI; DONG SEONG KIM et al.Lecture notes in computer science. 2006, pp 2-13, issn 0302-9743, isbn 3-540-36646-6, 1Vol, 12 p.Conference Paper

Accountable Privacy. Authors' replyBURMESTER, Mike; DESMEDT, Yvo; SERJANTOV, Andrei et al.BURMESTER, Mike; SERJANTOV, Andrei et al.BURMESTER, Mike; Lecture notes in computer science. 2006, pp 83-105, issn 0302-9743, isbn 3-540-40925-4, 1Vol, 23 p.Conference Paper

A protocol's life after attacks... Commentary. Authors' replyBELLA, Giampaolo; BISTARELI, Stefano; IOANNIDIS, John et al.IOANNIDIS, John et al.Lecture notes in computer science. 2005, pp 3-18, issn 0302-9743, isbn 3-540-28389-7, 16 p.Conference Paper

  • Page / 2