Follow
Alan T. Sherman
Alan T. Sherman
Professor of Computer Science, Dept. of CSEE, University of Maryland, Baltimore County
Verified email at umbc.edu - Homepage
Title
Cited by
Cited by
Year
Key establishment in large dynamic groups using one-way function trees
AT Sherman, DA McGrew
IEEE transactions on Software Engineering 29 (5), 444-458, 2003
10302003
Key management for large dynamic groups: One-way function trees and amortized initialization
D Balenson, D McGrew, A Sherman
Mar 15, 1-14, 1999
3471999
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
3332012
Scantegrity: End-to-end voter-verifiable optical-scan voting
D Chaum, A Essex, R Carback, J Clark, S Popoveniuc, A Sherman, ...
IEEE Security & Privacy 6 (3), 40-46, 2008
2502008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
EVT 8 (1), 13, 2008
2302008
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform
J Dykstra, AT Sherman
Digital Investigation 10, S87-S95, 2013
2142013
Scantegrity {II} Municipal Election at Takoma Park: The First {E2E} Binding Governmental Election with Ballot Privacy
R Carback, D Chaum, J Clark, J Conway, A Essex, PS Herrnson, ...
19th USENIX Security Symposium (USENIX Security 10), 2010
1542010
Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing
FJ Krautheim, DS Phatak, AT Sherman
International conference on trust and trustworthy computing, 211-227, 2010
1232010
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes
D Chaum, RT Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
IEEE transactions on information forensics and security 4 (4), 611-627, 2009
1232009
Understanding issues in cloud forensics: two hypothetical case studies
J Dykstra, AT Sherman
UMBC Computer Science and Electrical Engineering Department, 2011
1172011
Punchscan: Introduction and system definition of a high-integrity election system
K Fisher, R Carback, AT Sherman
Proceedings of Workshop on Trustworthy Elections, 19-29, 2006
1102006
Proceedings of Crypto 82
D Chaum, RL Rivest, AT Sherman
110*1982
A note on Bennett’s time-space tradeoff for reversible computation
RY Levine, AT Sherman
SIAM Journal on Computing 19 (4), 673-677, 1990
1091990
Is the Data Encryption Standard a group?(Results of cycling experiments on DES)
BS Kaliski, RL Rivest, AT Sherman
Journal of Cryptology 1 (1), 3-36, 1988
1071988
Is the Data Encryption Standard a group?(Results of cycling experiments on DES)
BS Kaliski, RL Rivest, AT Sherman
Journal of Cryptology 1 (1), 3-36, 1988
1071988
Randomized encryption techniques
RL Rivest, AT Sherman
Advances in Cryptology, 145-163, 1983
681983
Policy-based security management for large dynamic groups: An overview of the DCCM project
PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
632000
Identifying core concepts of cybersecurity: Results of two Delphi processes
G Parekh, D DeLatte, GL Herman, L Oliva, D Phatak, T Scheponik, ...
IEEE Transactions on Education 61 (1), 11-20, 2017
612017
On the origins and variations of blockchain technologies
AT Sherman, F Javani, H Zhang, E Golaszewski
IEEE Security & Privacy 17 (1), 72-77, 2019
602019
System and method for key distribution in a hierarchical tree
PT Dinsmore, M Heyman, P Kruus, AT Sherman
US Patent 7,043,024, 2006
582006
The system can't perform the operation now. Try again later.
Articles 1–20