Follow
Alan T. Sherman
Alan T. Sherman
Professor of Computer Science, Dept. of CSEE, University of Maryland, Baltimore County
Verified email at umbc.edu - Homepage
Title
Cited by
Cited by
Year
Key establishment in large dynamic groups using one-way function trees
AT Sherman, DA McGrew
IEEE transactions on Software Engineering 29 (5), 444-458, 2003
10352003
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
J Dykstra, AT Sherman
Digital Investigation 9, S90-S98, 2012
3552012
Key management for large dynamic groups: One-way function trees and amortized initialization
D Balenson, D McGrew, A Sherman
Internet-Draft, 1999
3511999
Scantegrity: End-to-end voter-verifiable optical-scan voting
D Chaum, A Essex, R Carback, J Clark, S Popoveniuc, A Sherman, ...
IEEE Security & Privacy 6 (3), 40-46, 2008
2622008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
EVT 8 (1), 13, 2008
2352008
Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform
J Dykstra, AT Sherman
Digital Investigation 10, S87-S95, 2013
2252013
Scantegrity II municipal election at Takoma Park: The first E2E binding governmental election with ballot privacy
R Carback, D Chaum, J Clark, J Conway, A Essex, PS Herrnson, ...
USENIX Association, 2010
1572010
Scantegrity II: End-to-end verifiability by voters of optical scan elections through confirmation codes
D Chaum, RT Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ...
IEEE transactions on information forensics and security 4 (4), 611-627, 2009
1332009
Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing
FJ Krautheim, DS Phatak, AT Sherman
Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010
1292010
Understanding issues in cloud forensics: two hypothetical case studies
J Dykstra, AT Sherman
UMBC Computer Science and Electrical Engineering Department, 2011
1222011
Punchscan: Introduction and system definition of a high-integrity election system
K Fisher, R Carback, AT Sherman
Proceedings of Workshop on Trustworthy Elections, 19-29, 2006
1162006
Proceedings of Crypto 82
D Chaum, RL Rivest, AT Sherman
114*1982
A note on Bennett’s time-space tradeoff for reversible computation
RY Levine, AT Sherman
SIAM Journal on Computing 19 (4), 673-677, 1990
1111990
Is the Data Encryption Standard a group?(Results of cycling experiments on DES)
BS Kaliski, RL Rivest, AT Sherman
Journal of Cryptology 1 (1), 3-36, 1988
1111988
Is the Data Encryption Standard a group?(Results of cycling experiments on DES)
BS Kaliski, RL Rivest, AT Sherman
Journal of Cryptology 1 (1), 3-36, 1988
1111988
On the origins and variations of blockchain technologies
AT Sherman, F Javani, H Zhang, E Golaszewski
IEEE Security & Privacy 17 (1), 72-77, 2019
842019
Randomized encryption techniques
RL Rivest, AT Sherman
Advances in Cryptology: Proceedings of Crypto 82, 145-163, 1983
711983
Identifying core concepts of cybersecurity: Results of two Delphi processes
G Parekh, D DeLatte, GL Herman, L Oliva, D Phatak, T Scheponik, ...
IEEE Transactions on Education 61 (1), 11-20, 2017
672017
Policy-based security management for large dynamic groups: An overview of the DCCM project
PT Dinsmore, DM Balenson, M Heyman, PS Kruus, CD Scace, ...
Proceedings DARPA Information Survivability Conference and Exposition …, 2000
632000
System and method for key distribution in a hierarchical tree
PT Dinsmore, M Heyman, P Kruus, AT Sherman
US Patent 7,043,024, 2006
592006
The system can't perform the operation now. Try again later.
Articles 1–20