Alan T. Sherman
Alan T. Sherman
Professor of Computer Science, Dept. of CSEE, University of Maryland, Baltimore County
Verifierad e-postadress på - Startsida
TitelCiteras avÅr
Key establishment in large dynamic groups using one-way function trees
AT Sherman, DA McGrew
IEEE transactions on Software Engineering 29 (5), 444-458, 2003
Key management for large dynamic groups: One-way function trees and amortized initialization
D Balenson, D McGrew, A Sherman
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
Scantegrity: End-to-end voter-verifiable optical-scan voting
D Chaum, A Essex, R Carback, J Clark, S Popoveniuc, A Sherman, ...
IEEE Security & Privacy 6 (3), 40-46, 2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
EVT 8, 1-13, 2008
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform
J Dykstra, AT Sherman
Digital Investigation 10, S87-S95, 2013
Is the Data Encryption Standard a group?(Results of cycling experiments on DES)
BS Kaliski, RL Rivest, AT Sherman
Journal of Cryptology 1 (1), 3-36, 1988
Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy
R Carback, D Chaum, J Clark, J Conway, A Essex, PS Herrnson, ...
USENIX Association, 2010
Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing
FJ Krautheim, DS Phatak, AT Sherman
International Conference on Trust and Trustworthy Computing, 211-227, 2010
Understanding issues in cloud forensics: two hypothetical case studies
J Dykstra, AT Sherman
UMBC Computer Science and Electrical Engineering Department, 2011
Punchscan: Introduction and system definition of a high-integrity election system
K Fisher, R Carback, AT Sherman
Proceedings of Workshop on Trustworthy Elections, 19-29, 2006
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes
D Chaum, RT Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
IEEE transactions on information forensics and security 4 (4), 611-627, 2009
Proceedings of Crypto 82
D Chaum, RL Rivest, AT Sherman
Springer-Verlag, 1983
A note on Bennett’s time-space tradeoff for reversible computation
RY Levine, AT Sherman
SIAM Journal on Computing 19 (4), 673-677, 1990
Policy-based security management for large dynamic groups: An overview of the DCCM project
PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
System and method for key distribution in a hierarchical tree
PT Dinsmore, M Heyman, P Kruus, AT Sherman
US Patent 7,043,024, 2006
System and method for enabling authentication at different authentication strength-performance levels
DW Carman, MD Heyman, AT Sherman
US Patent 6,915,426, 2005
Randomized encryption techniques
RL Rivest, AT Sherman
Advances in Cryptology, 145-163, 1983
An observation on associative one-way functions in complexity theory
M Rabi, AT Sherman
Information Processing Letters 64 (5), 239-244, 1997
Statistical techniques for language recognition: An introduction and guide for cryptanalysts
R Ganesan, AT Sherman
Cryptologia 17 (4), 321-366, 1993
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20