How much anonymity does network latency leak? N Hopper, EY Vasserman, E Chan-Tin ACM Transactions on Information and System Security (TISSEC) 13 (2), 1-28, 2010 | 324 | 2010 |
Be selfish and avoid dilemmas: Fork after withholding (faw) attacks on bitcoin Y Kwon, D Kim, Y Son, E Vasserman, Y Kim Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 263 | 2017 |
Vampire attacks: draining life from wireless ad hoc sensor networks EY Vasserman, N Hopper IEEE transactions on mobile computing 12 (2), 318-332, 2011 | 263 | 2011 |
Losing control of the internet: Using the data plane to attack the control plane M Schuchard, A Mohaisen, D Foo Kune, N Hopper, Y Kim, EY Vasserman Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 150 | 2010 |
Rationale and architecture principles for medical application platforms J Hatcliff, A King, I Lee, A MacDonald, A Fernando, M Robkin, ... 2012 IEEE/ACM Third International Conference on Cyber-Physical Systems, 3-12, 2012 | 110 | 2012 |
Membership-concealing overlay networks E Vasserman, R Jansen, J Tyra, N Hopper, Y Kim Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 83 | 2009 |
Combating double-spending using cooperative P2P systems I Osipkov, EY Vasserman, N Hopper, Y Kim 27th International Conference on Distributed Computing Systems (ICDCS'07), 41-41, 2007 | 66 | 2007 |
Improved group off-the-record messaging H Liu, EY Vasserman, N Hopper Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013 | 40 | 2013 |
A framework of cybersecurity approaches in precision agriculture H Chi, S Welch, E Vasserman, E Kalaimannan proceedings of the ICMLG2017 5th International Conference on Management …, 2017 | 37 | 2017 |
SilentKnock: practical, provably undetectable authentication EY Vasserman, N Hopper, J Tyra International Journal of Information Security 8 (2), 121-135, 2009 | 37 | 2009 |
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs A Mohaien, DF Kune, EY Vasserman, M Kim, Y Kim IEEE Transactions on Dependable and Secure Computing 10 (6), 380-393, 2013 | 35 | 2013 |
Security and interoperable-medical-device systems, part 1 KK Venkatasubramanian, EY Vasserman, O Sokolsky, I Lee IEEE security & privacy 10 (5), 61-63, 2012 | 35 | 2012 |
An Overview of Regulatory and Trust Issues for the Integrated Clinical Environment J Hatcliff, E Vasserman, S Weininger, J Goldman HCMDSS, 2011 | 26 | 2011 |
SAFE and secure: Deeply integrating security in a new hazard analysis S Procter, EY Vasserman, J Hatcliff Proceedings of the 12th International Conference on Availability …, 2017 | 22 | 2017 |
Do different mental models influence cybersecurity behavior? Evaluations via statistical reasoning performance GL Brase, EY Vasserman, W Hsu Frontiers in psychology 8, 306785, 2017 | 21 | 2017 |
A flexible authorization architecture for systems of interoperable medical devices Q Tasali, C Chowdhury, EY Vasserman Proceedings of the 22nd ACM on Symposium on Access Control Models and …, 2017 | 21 | 2017 |
Spreading the word: introducing pre-service teachers to programming in the K12 classroom S Bell, T Frey, E Vasserman Proceedings of the 45th ACM technical symposium on Computer science …, 2014 | 21 | 2014 |
Security and interoperable-medical-device systems, part 2: Failures, consequences, and classification EY Vasserman, KK Venkatasubramanian, O Sokolsky, I Lee IEEE security & privacy 10 (6), 70-73, 2012 | 21 | 2012 |
Toward a safe integrated clinical environment: a communication security perspective D Foo Kune, K Venkatasubramanian, E Vasserman, I Lee, Y Kim Proceedings of the 2012 ACM workshop on Medical communication systems, 7-12, 2012 | 21 | 2012 |
Challenges of distributed risk management for medical application platforms J Hatcliff, EY Vasserman, T Carpenter, R Whillock 2018 IEEE Symposium on Product Compliance Engineering (ISPCE), 1-14, 2018 | 19 | 2018 |