Eugene Y. Vasserman, Ph.D.
Affiliations: | 2010 | Computer Science | University of Minnesota, Twin Cities, Minneapolis, MN |
Area:
Computer Science, Speech CommunicationGoogle:
"Eugene Vasserman"Parents
Sign in to add mentorNicholas J. Hopper | grad student | 2010 | UMN | |
(Towards freedom of speech on the Internet: Censorship-resistant communication and storage.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Brase GL, Vasserman EY, Hsu W. (2017) Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance. Frontiers in Psychology. 8: 1929 |
Xue Y, Vasserman EY. (2016) Simple and compact flow fingerprinting robust to transit through low-latency anonymous networks 2016 13th Ieee Annual Consumer Communications and Networking Conference, Ccnc 2016. 765-773 |
Loughlin S, Fu K, Gee T, et al. (2014) A Roundtable Discussion: safeguarding information and resources against emerging cybersecurity threats. Biomedical Instrumentation & Technology / Association For the Advancement of Medical Instrumentation. 8-17 |
Liu H, Vasserman EY, Hopper N. (2013) Improved group off-the-record messaging Proceedings of the Acm Conference On Computer and Communications Security. 249-254 |
Vasserman EY, Hopper N. (2013) Vampire attacks: Draining life from wireless ad Hoc sensor networks Ieee Transactions On Mobile Computing. 12: 318-332 |
Mohaien A, Kune DF, Vasserman EY, et al. (2013) Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs Ieee Transactions On Dependable and Secure Computing. 10: 380-393 |
Schuchard M, Mohaisen A, Foo Kune D, et al. (2010) Losing control of the Internet: Using the data plane to attack the control plane Proceedings of the Acm Conference On Computer and Communications Security. 726-728 |
Mohaisen A, Vasserman EY, Schuchard M, et al. (2010) Secure encounter-based social networks: Requirements, challenges, and designs Proceedings of the Acm Conference On Computer and Communications Security. 717-719 |
Hopper N, Vasserman EY, Chan-Tin E. (2010) How much anonymity does network latency leak? Acm Transactions On Information and System Security. 13 |
Osipkov I, Vasserman EY, Hopper N, et al. (2007) Combating double-spending using cooperative P2P systems Proceedings - International Conference On Distributed Computing Systems |