Publications and Technical Reports are the most efficient and concise forms of keeping all interested parties up to date and aware of the progess being made at SAIT Labs. A lot of effort is placed on creating good information rich bodies of research for the reader. Publications will provide a good overview of the areas of research this project has touched, and reports will express more clearly the current status or goals of the project.
Publications
- Andel, Todd and Alec Yasinsac. “Wireless Protocol Security; to Simulate or not Simulate.” Proceedings of the Symposium on Simulation Software and Security (SSSS 06). Part of the 2006 Spring Simulation Multiconference (SpringSim’06). Von Braun Center, Huntsville, AL. 2-6 April 2006.
- Yasinsac, Alec and J. Todd McDonald. “Security-Aware Coding.” Mini-track on Information Security Education and Foundational Research. 39th Annual Hawaii International Conference On System Sciences (HICSS 39). 4-7 January 2006.
- Scott, D.J. “Relying On Time Synchronization for Security in Ad-hoc Networks.” Proceedings of the 43rd ACM Southeast Conference (ACMSE 2006). Kennesaw State University, Kennesaw, GA. 18-20 March 2005.
- Suen, Tina and Alec Yasinsac. “Peer Identification in Wireless Sensor Networks Using Signal Properties.” 2005 IEEE Workshop on Wireless and Sensor Network Security. Washington DC. 7-10 November 2005.
- McDonald, J. Todd, Alec Yasinsac, and Willard C. Thompson. “Of Unicorns and Random Programs.” The Third IASTED International Conference on Communications and Computer Networks (CCN 2005). Marina del Rey, CA. 24-26 October 2005.
- McDonald, J. Todd and Alec Yasinsac. “Application Security Models for Mobile Agent Systems.” Proceedings of the 1st International Workshop on Security and Trust Management, Electronic Notes in Theoretical Computer Science. 15 September 2005. 25% acceptance (9 of 36).
- Suen, Tina and Alec Yasinsac. “Ad-hoc Network Security: Peer Identification and Authentication Using Signal Properties.” Poster presentation. The 6th IEEE SMC Information Assurance Workshop. West Point, NY. 15-17 June 2005
- McDonald, Todd, Alec Yasinsac, and Willard Thompson. “Mobile Agent Data Integrity Using Multi-agent Architecture.” Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 536-42. San Francisco, CA. 15-17 September 2004.
- Thompson, Willard, Alec Yasinsac, and Todd McDonald. “Semantic Encryption Transformation Scheme.” Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, pp. 516-21. San Francisco, CA. 15-17 September 2004.
- Burmester, Mike, Tri van Le, and Alec Yasinsac. “Weathering the Storm: Managing Redundancy and Security in Ad-hoc Networks.” Proceedings of the 3rd International Conference on Ad-hoc Networks & Wireless, pp. 96-107. Vancouver, British Columbia. 22-24 July 2004.
- Scott, D.J. and Alec Yasinsac. “Dynamic Probabilistic Retransmission in Ad-hoc Networks.” Proceedings of the International Conference on Wireless Networks, pp. 158-64. 21-24 June 2004.
- Burmester, Mike and Tri van Le. “Secure Communications in Ad-hoc Networks.” Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 234-241. West Point, NY. 10-11 June 2004.
- Ramachandran, Prabha and Alec Yasinsac. “Limitations of On Demand Secure Routing Protocols.” Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 52-59. West Point, NY. 10-11 June 2004.
- Burmester, Mike and Tri van Le. “Secure Multipath Communication in Mobile Ad-hoc Networks.” International Conference on Information Technology: Coding and Computing (ITCC 2004). Las Vegas, NV. 5-7 April 2004.
- Burmester, Mike, Tri van Le, and M. Weir. “Tracing Byzantine Faults in Ad-hoc Networks.” Communication, Network, and Information Security 2003, pp. 43-46. New York, NY. 10-12 December 2003.
- Carter, Stephen, and Alec Yasinsac. “Secure Position Aided Ad-hoc Routing Protocol.” Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02). 3-4 November 2002.
- Yasinsac, Alec, Vik Thakur, Stephen Carter, and Ilkay Cubukcu. “A Family of Protocols for Group Key Generation in Ad-hoc Networks.” Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02). 3-4 November 2002.
Reports
This material is based upon work supported in part by the U.S. Army Research Laboratory and the U.S. Army Research Office under grant number DAAD19-02-1-0235.
|