34 Publications (Page 2 of 2)
2012
One-way indexing for plausible deniability in censorship resistant storageVasserman, E.Y.⋅Heorhiadi, V.⋅Hopper, N. and Kim, Y.2nd USENIX Workshop on Free and Open Communications on the Internet, FOCI 2012, co-located with USENIX Security 2012.
| Conference Proceeding
Rationale and architecture principles for medical application platformsHatcliff, J.⋅King, A.⋅Lee, I.⋅MacDonald, A.⋅Fernando, A.⋅Robkin, M.⋅Vasserman, E.⋅Weininger, S. and Goldman, J.M.Proceedings - 2012 IEEE/ACM 3rd International Conference on Cyber-Physical Systems, ICCPS 2012, pp. 3-12.
| Conference Proceeding
Security and Interoperable Medical Device Systems, Part 2: Failures, Consequences and Classifications.Vasserman, Eugene Y⋅Venkatasubramanian, Krishna K⋅Sokolsky, Oleg and Lee, InsupIEEE security & privacy, vol. 10, (no. 6), pp. 70-73, November 2012.
| Journal Article
Toward a safe integrated clinical environment: A communication security perspectiveFoo Kune, D.⋅Venkatasubramanian, K.⋅Vasserman, E.⋅Lee, I. and Kim, Y.MedCOMM’12 - Proceedings of the ACM International Workshop on Medical Communication Systems, pp. 7-12.
| Conference Proceeding
2007
Combating Double-Spending Using Cooperative P2P SystemsOsipkov, Ivan⋅Vasserman, Eugene Y.⋅Hopper, Nicholas and Kim, YongdaeIEEE.
| Conference Proceeding
How much anonymity does network latency leak?Hopper, Nicholas J⋅Vasserman, Eugene Y and Chan Tin, Eric DConference on Computer and Communications Security: Proceedings of the 14th ACM conference on Computer and communications security; 28-31 Oct. 2007. 2007.
| Conference Proceeding
n.d.no date or unknown
Developing and Piloting a Quantitative Assessment Tool for Cybersecurity CoursesBell, Richard⋅Vasserman, Eugene and Sayre, EleanorASEE Conferences.
| Conference Proceeding