Follow
Eugene Vasserman
Title
Cited by
Cited by
Year
How much anonymity does network latency leak?
N Hopper, EY Vasserman, E Chan-Tin
ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010
3252010
Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
2722017
Vampire attacks: Draining life from wireless ad hoc sensor networks
EY Vasserman, N Hopper
IEEE transactions on mobile computing 12 (2), 318-332, 2011
2682011
Losing control of the internet: Using the data plane to attack the control plane
M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1522010
Rationale and architecture principles for medical application platforms
J Hatcliff, A King, I Lee, A MacDonald, A Fernando, M Robkin, ...
2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 3-12, 2012
1102012
Membership-concealing overlay networks
E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
832009
Combating double-spending using cooperative P2P systems
I Osipkov, EY Vasserman, N Hopper, Y Kim
27th International Conference on Distributed Computing Systems (ICDCS'07), 41-41, 2007
692007
Improved group off-the-record messaging
H Liu, EY Vasserman, N Hopper
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
402013
SilentKnock: practical, provably undetectable authentication
EY Vasserman, N Hopper, J Tyra
International Journal of Information Security 8 (2), 121-135, 2009
372009
A framework of cybersecurity approaches in precision agriculture
H Chi, S Welch, E Vasserman, E Kalaimannan
proceedings of the ICMLG2017 5th International Conference on Management …, 2017
352017
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
A Mohaien, DF Kune, EY Vasserman, M Kim, Y Kim
IEEE Transactions on Dependable and Secure Computing 10 (6), 380-393, 2013
352013
Security and interoperable-medical-device systems, part 1
KK Venkatasubramanian, EY Vasserman, O Sokolsky, I Lee
IEEE security & privacy 10 (5), 61-63, 2012
352012
An Overview of Regulatory and Trust Issues for the Integrated Clinical Environment
J Hatcliff, E Vasserman, S Weininger, J Goldman
HCMDSS, 2011
262011
Do different mental models influence cybersecurity behavior? Evaluations via statistical reasoning performance
GL Brase, EY Vasserman, W Hsu
Frontiers in psychology 8, 1929, 2017
222017
Spreading the word: introducing pre-service teachers to programming in the K12 classroom
S Bell, T Frey, E Vasserman
Proceedings of the 45th ACM technical symposium on Computer science …, 2014
222014
SAFE and secure: Deeply integrating security in a new hazard analysis
S Procter, EY Vasserman, J Hatcliff
Proceedings of the 12th International Conference on Availability …, 2017
212017
A flexible authorization architecture for systems of interoperable medical devices
Q Tasali, C Chowdhury, EY Vasserman
Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017
212017
Security and interoperable-medical-device systems, part 2: Failures, consequences, and classification
EY Vasserman, KK Venkatasubramanian, O Sokolsky, I Lee
IEEE security & privacy 10 (6), 70-73, 2012
212012
Toward a safe integrated clinical environment: a communication security perspective
D Foo Kune, K Venkatasubramanian, E Vasserman, I Lee, Y Kim
Proceedings of the 2012 ACM workshop on Medical communication systems, 7-12, 2012
212012
A reference separation architecture for mixed-criticality medical and iot devices
T Carpenter, J Hatcliff, EY Vasserman
Proceedings of the 1st ACM Workshop on the Internet of Safe Things, 14-19, 2017
192017
The system can't perform the operation now. Try again later.
Articles 1–20