Eugene Vasserman
Cited by
Cited by
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Vampire attacks: Draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper
IEEE transactions on mobile computing 12 (2), 318-332, 2011
Losing control of the internet: Using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Rationale and architecture principles for medical application platforms
J Hatcliff, A King, I Lee, A MacDonald, A Fernando, M Robkin, ...
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 3-12, 2012
Membership-concealing overlay networks
E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Combating double-spending using cooperative P2P systems
I Osipkov, EY Vasserman, N Hopper, Y Kim
27th International Conference on Distributed Computing Systems (ICDCS'07), 41-41, 2007
Improved group off-the-record messaging
H Liu, EY Vasserman, N Hopper
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
SilentKnock: practical, provably undetectable authentication
EY Vasserman, N Hopper, J Tyra
International Journal of Information Security 8 (2), 121-135, 2009
A framework of cybersecurity approaches in precision agriculture
H Chi, S Welch, E Vasserman, E Kalaimannan
proceedings of the ICMLG2017 5th International Conference on Management …, 2017
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
A Mohaien, DF Kune, EY Vasserman, M Kim, Y Kim
IEEE Transactions on Dependable and Secure Computing 10 (6), 380-393, 2013
Security and interoperable-medical-device systems, part 1
KK Venkatasubramanian, EY Vasserman, O Sokolsky, I Lee
IEEE security & privacy 10 (5), 61-63, 2012
An Overview of Regulatory and Trust Issues for the Integrated Clinical Environment
J Hatcliff, E Vasserman, S Weininger, J Goldman
HCMDSS, 2011
Spreading the word: introducing pre-service teachers to programming in the K12 classroom
S Bell, T Frey, E Vasserman
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
Do different mental models influence cybersecurity behavior? Evaluations via statistical reasoning performance
GL Brase, EY Vasserman, W Hsu
Frontiers in psychology 8, 1929, 2017
SAFE and secure: Deeply integrating security in a new hazard analysis
S Procter, EY Vasserman, J Hatcliff
Proceedings of the 12th International Conference on Availability …, 2017
A flexible authorization architecture for systems of interoperable medical devices
Q Tasali, C Chowdhury, EY Vasserman
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
Security and interoperable-medical-device systems, part 2: Failures, consequences, and classification
EY Vasserman, KK Venkatasubramanian, O Sokolsky, I Lee
IEEE security & privacy 10 (6), 70-73, 2012
Toward a safe integrated clinical environment: a communication security perspective
D Foo Kune, K Venkatasubramanian, E Vasserman, I Lee, Y Kim
Proceedings of the 2012 ACM workshop on Medical communication systems, 7-12, 2012
Challenges of distributed risk management for medical application platforms
J Hatcliff, EY Vasserman, T Carpenter, R Whillock
2018 IEEE Symposium on Product Compliance Engineering (ISPCE), 1-14, 2018
The system can't perform the operation now. Try again later.
Articles 1–20