Alan T. Sherman
Orcid: 0000-0003-1130-4678Affiliations:
- University of Maryland, USA
According to our database1,
Alan T. Sherman
authored at least 73 papers
between 1982 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Inf. Secur. J. A Glob. Perspect., January, 2024
Cryptologia, January, 2024
A User Experience Study of MeetingMayhem: A Web-Based Game to Teach Adversarial Thinking.
Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1, 2024
2023
Proceedings of the 54th ACM Technical Symposium on Computer Science Education, Volume 1, 2023
2022
ACM Trans. Comput. Educ., 2022
IACR Cryptol. ePrint Arch., 2022
Phrase-verified voting: Verifiable low-tech remote boardroom voting: How We Voted on Tenure & Promotion Cases during the Pandemic.
Cryptologia, 2022
2021
2020
Project-based learning continues to inspire cybersecurity students: the 2018-2019 SFS research studies at UMBC.
Inroads, 2020
Cryptologia, 2020
Boardroom Voting: Verifiable Voting with Ballot Privacy Using Low-Tech Cryptography in a Single Room.
CoRR, 2020
Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity.
Proceedings of the National Cyber Summit (NCS) Research Track 2020, 2020
Proceedings of the Logic, 2020
2019
Project-Based Learning Inspires Cybersecurity Students: A Scholarship-for-Service Research Study.
IEEE Secur. Priv., 2019
The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories.
IEEE Secur. Priv., 2019
The SFS summer research study at UMBC: Project-based learning inspires cybersecurity students.
Cryptologia, 2019
PPT: New Low Complexity Deterministic Primality Tests Leveraging Explicit and Implicit Non-Residues. A Set of Three Companion Manuscripts.
CoRR, 2019
Proceedings of the National Cyber Summit, 2019
Initial Validation of the Cybersecurity Concept Inventory: Pilot Testing and Expert Review.
Proceedings of the IEEE Frontiers in Education Conference, 2019
2018
IEEE Trans. Educ., 2018
2017
Mini-MAC: Raising the bar for vehicular security with a lightweight message authentication protocol.
Veh. Commun., 2017
INSuRE: Collaborating Centers of Academic Excellence Engage Students in Cybersecurity Research.
IEEE Secur. Priv., 2017
Chaum's protocol for detecting man-in-the-middle: Explanation, demonstration, and timing studies for a text-messaging scenario.
Cryptologia, 2017
CoRR, 2017
CoRR, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016
2014
How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search.
IACR Cryptol. ePrint Arch., 2014
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptol. ePrint Arch., 2014
A Preliminary FPGA Implementation and Analysis of Phatak's Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System.
IACR Cryptol. ePrint Arch., 2014
SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education.
Proceedings of the 2014 USENIX Summit on Gaming, 2014
2013
Spread Identity: A new dynamic address remapping mechanism for anonymity and DDoS defense.
J. Comput. Secur., 2013
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform.
Digit. Investig., 2013
2012
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques.
Digit. Investig., 2012
Location Authentication, Tracking, and Emergency Signaling through Power Line Communication: Designs and Protocols for New Out-of-Band Strategies.
Cryptologia, 2012
Proceedings of the 9th International Symposium on Visualization for Cyber Security, 2012
2011
Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
A New Paradigm to Approximate Oblivious Data Processing (ODP) for Data Confidentiality in Cloud Computing.
Proceedings of the World Congress on Services, 2011
2010
Corrections to TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules.
IEEE Trans. Inf. Forensics Secur., 2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010
Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Proceedings of the Electronic Voting 2010, 2010
2009
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules.
IEEE Trans. Inf. Forensics Secur., 2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009
2008
IEEE Secur. Priv., 2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
2006
An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study.
Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, 2006
2003
IEEE Trans. Software Eng., 2003
1997
Inf. Process. Lett., 1997
1995
1994
Experimental evaluation of a partitioning algorithm for the steiner tree problem in <i>R</i><sup>2</sup> and <i>R</i><sup>3</sup>.
Networks, 1994
Probabilistic analysis of an enhanced partitioning algorithm for the steiner tree problem in <i>R<sup>d</sup></i>.
Networks, 1994
Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English.
Cryptologia, 1994
1993
Statistical Techniques for Language Recognition: an Introduction and Guide for Cryptanalysts.
Cryptologia, 1993
1991
1990
SIAM J. Comput., 1990
1989
Texts and Monographs in Computer Science, Springer, ISBN: 978-1-4613-9658-1, 1989
1988
J. Cryptol., 1988
1985
Proceedings of the Advances in Cryptology, 1985
Proceedings of the Advances in Cryptology, 1985
1982
Proceedings of the Advances in Cryptology: Proceedings of CRYPTO '82, 1982