Eugene Y. Vasserman, Ph.D.

Affiliations: 
2010 Computer Science University of Minnesota, Twin Cities, Minneapolis, MN 
Area:
Computer Science, Speech Communication
Google:
"Eugene Vasserman"

Parents

Sign in to add mentor
Nicholas J. Hopper grad student 2010 UMN
 (Towards freedom of speech on the Internet: Censorship-resistant communication and storage.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Brase GL, Vasserman EY, Hsu W. (2017) Do Different Mental Models Influence Cybersecurity Behavior? Evaluations via Statistical Reasoning Performance. Frontiers in Psychology. 8: 1929
Xue Y, Vasserman EY. (2016) Simple and compact flow fingerprinting robust to transit through low-latency anonymous networks 2016 13th Ieee Annual Consumer Communications and Networking Conference, Ccnc 2016. 765-773
Loughlin S, Fu K, Gee T, et al. (2014) A Roundtable Discussion: safeguarding information and resources against emerging cybersecurity threats. Biomedical Instrumentation & Technology / Association For the Advancement of Medical Instrumentation. 8-17
Liu H, Vasserman EY, Hopper N. (2013) Improved group off-the-record messaging Proceedings of the Acm Conference On Computer and Communications Security. 249-254
Vasserman EY, Hopper N. (2013) Vampire attacks: Draining life from wireless ad Hoc sensor networks Ieee Transactions On Mobile Computing. 12: 318-332
Mohaien A, Kune DF, Vasserman EY, et al. (2013) Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs Ieee Transactions On Dependable and Secure Computing. 10: 380-393
Schuchard M, Mohaisen A, Foo Kune D, et al. (2010) Losing control of the Internet: Using the data plane to attack the control plane Proceedings of the Acm Conference On Computer and Communications Security. 726-728
Mohaisen A, Vasserman EY, Schuchard M, et al. (2010) Secure encounter-based social networks: Requirements, challenges, and designs Proceedings of the Acm Conference On Computer and Communications Security. 717-719
Hopper N, Vasserman EY, Chan-Tin E. (2010) How much anonymity does network latency leak? Acm Transactions On Information and System Security. 13
Osipkov I, Vasserman EY, Hopper N, et al. (2007) Combating double-spending using cooperative P2P systems Proceedings - International Conference On Distributed Computing Systems
See more...