Alan T. Sherman
University of Maryland, Baltimore County
H-index: 31
North America-United States
Top articles of Alan T. Sherman
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Shadow IT in higher education: survey and case study for cybersecurity | Cryptologia | Selma Gomez Orr Cyrus Jian Bonyadi Enis Golaszewski Alan T Sherman Peter AH Peterson | 2024/1/2 |
BVOT: Self-tallying boardroom voting with oblivious transfer | Information Security Journal: A Global Perspective | Farid Javani Alan T Sherman | 2024/1/2 |
Limitations of Wrapping Protocols and TLS Channel Bindings: Formal-Methods Analysis of the Session Binding Proxy Protocol (submitted to CIC) | Communications in Cryptology | Enis Golaszewski Edward Zieglar Alan T Sherman Kirellos Abou Elsaad Jonathan Fuchs | 2024/1 |
Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Authentication | ACM CCS (submitted) | Enis Golaszewski Alan T Sherman Edward Zieglar | 2023/7 |
Psychometric evaluation of the cybersecurity curriculum assessment | Geoffrey L Herman Shan Huang Peter A Peterson Linda Oliva Enis Golaszewski | 2023/3/2 | |
Editorial | Public Sciences & Policies | Pedro G Rodrigues Maria João Bárrios Feliciano Villar | 2020 |
VoteXX: A solution to improper influence in voter-verifiable elections | E-VOTE-ID 2022, to appear | David Chaum Richard T Carback Jeremy Clark Chao Liu Mahdi Nejadgholi | 2022/1 |
UDM: Private user discovery with minimal information disclosure | Cryptologia | David Chaum Mario Yaksetig Alan T Sherman Joeri de Ruiter | 2022/6/14 |
Phrase-verified voting: verifiable low-tech remote boardroom voting: how we voted on tenure & promotion cases during the pandemic | Cryptologia | Enka Blanchard Ryan Robucci Ted Selker Alan T Sherman | 2022/1/2 |
Psychometric evaluation of the cybersecurity concept inventory | ACM Transactions on Computing Education (TOCE) | Seth Poulsen Geoffrey L Herman Peter AH Peterson Enis Golaszewski Akshita Gorti | 2021/10/18 |
AOT: Anonymization by oblivious transfer | arXiv preprint arXiv:2105.10794 | Farid Javani Alan T Sherman | 2021/5/22 |
Votexx: Coercion resistance for the real world (preliminary extended abstract) | David Chaum Richard T Carback Jeremy Clark Chao Liu Mahdi Nejadgholi | 2021 | |
Phishing in an academic community: A study of user susceptibility and behavior | Cryptologia | Alejandra Diaz Alan T Sherman Anupam Joshi | 2020/1/2 |
LDA Topic Analysis of a Cybersecurity Textbook | The 2020 Conference on Empirical Methods in Natural Language Processing (EMNLP 2020), November 16--20, 2020, online,(May 31, 2020), submitted | Travis Scheponik Alan T Sherman | 2020/10 |
Votexx: A remote voting system that is coercion resistant | David Chaum Richard T Carback III Jeremy Clark Chao Liu Mahdi Nejadgholi | 2020 | |
Analysis of the Secure Remote Password protocol using CPSA | High Confidence Software and Systems Conference (HCSS) | Erin Lanus Alan T Sherman R Chang E Golaszewski R Wnuk-Fink | 2020/10 |
Investigating crowdsourcing to generate distractors for multiple-choice assessments | Travis Scheponik Enis Golaszewski Geoffrey Herman Spencer Offenberger Linda Oliva | 2020 | |
Boardroom voting: Verifiable voting with ballot privacy using low-tech cryptography in a single room | arXiv preprint arXiv:2007.14916 | Enka Blanchard Ted Selker Alan T Sherman | 2020/7/29 |
Experiences and lessons learned creating and validating concept inventories for cybersecurity | Alan T Sherman Geoffrey L Herman Linda Oliva Peter AH Peterson Enis Golaszewski | 2020/6/2 | |
Learning Continues to Inspire Cybersecurity Students: The 2018-2019 SFS Research Studies at UMBC | Enis Golaszewski Alan T Sherman Linda Oliva Peter AH Peterson Michael R Bailey | 2020/5/12 |