Zobrazeno 1 - 10
of 292
pro vyhledávání: '"Alan T. Sherman"'
Publikováno v:
Cryptologia. 46:347-379
We present and analyze User Discovery with Minimal information disclosure (UDM), a new protocol for user discovery in anonymous communication systems that minimizes the information disclosed to the...
Autor:
Selma Gomez Orr, Cyrus Jian Bonyadi, Enis Golaszewski, Alan T. Sherman, Peter A. H. Peterson, Richard Forno, Sydney Johns, Jimmy Rodriguez
We explore shadow information technology (IT) at institutions of higher education through a two-tiered approach involving a detailed case study and comprehensive survey of IT professionals. In its many forms, shadow IT is the software or hardware pre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5d9cac4fb101cfb019c42ede40d9425e
Autor:
Brian Weber, Gabriel Onana, Joseph Roundy, Linda Oliva, William F. Morgan, Caleb Pinkney, Mykah Rather, Ryan Coleman, Lauren Mundy, Cyrus J. Bonyadi, Bryan Solis, Alan T. Sherman, Charles K. Varga, Jimmy Rodriguez, Tsigereda B. Tsega, Scott Bohon, Elias Enamorado, Johannah Flenner, Enis Golaszewski, Ryan Wnuk-Fink, Casey O'Brien, Peter A. H. Peterson, Maksim Ekin Eren, Selma Gomez Orr, Wubnyonga Tete, Mohammad Khan, Lindsay Zetlmeisl, Kyle Marshall, Jack Suess, Casey Borror, Armand Yonkeu, Michael R. Bailey, Emmanuel Larbi, Edwin Valdez, Lauren Parker, Damian Doyle
Publikováno v:
ACM Inroads. 11:46-54
We thank Jack Suess and Damian Doyle (UMBC Division of Information Technology)for their enthusiastic cooperation. Thanks to Richard Baldwin and Travis Scheponik for helpful comments. This project was supported in part by the National Science Foundati
Publikováno v:
Cryptologia. 44:53-67
We present an observational study on the relationship between demographic factors and phishing susceptibility at the University of Maryland, Baltimore County (UMBC). In spring 2018, we delivered phishing attacks to 450 randomly-selected students on t
Autor:
Ethan Goldschen, Alan T. Sherman, Mykah Rather, Jack Suess, Bryan Solis, Edwin Valdez, Linda Oliva, Edward LaFemina, Lauren Mundy, Casey O'Brien, Brian Weber, Peter A. H. Peterson, Wubnyonga Tete, Joseph Roundy, Enis Golaszewski, Mohammed Khan, Damian Doyle
Publikováno v:
IEEE Security & Privacy. 17:82-88
Over four summer days in 2017, cybersecurity students at the University of Maryland, Baltimore County (UMBC) analyzed the security of a targeted portion of the UMBC campus network, discovering numerous flaws, creating proof-of-concept exploits, and p
Autor:
Lauren Mundy, Edwin Valdez, Mykah Rather, Enis Golaszewski, Wubnyonga Tete, Linda Oliva, Bryan Solis, Ethan Goldschen, Joseph Roundy, Jack Suess, Edward LaFemina, Damian Doyle, Alan T. Sherman, Brian Weber, Mohammed Khan, Casey O'Brien
Publikováno v:
Cryptologia. 43:293-312
May 30-June 2, 2017, Scholarship for Service (SFS) scholars at the University of Maryland, Baltimore County (UMBC) analyzed the security of a targeted aspect of the UMBC computer systems. During this hands-on study, with complete access to source cod
Publikováno v:
IEEE Security & Privacy. 17:72-77
We explore the origins of blockchain technologies to better understand the enduring needs they address. We identify the five key elements of a blockchain, show embodiments of these elements, and examine how these elements come together to yield impor
We present Phrase-Verified Voting, a voter-verifiable remote voting system assembled from commercial off-the-shelf software for small private elections. The system is transparent and enables each voter to verify that the tally includes their ballot s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::053c774eb432e58ea31811276337180f
https://hal.science/hal-03164487
https://hal.science/hal-03164487
Publikováno v:
Technology Review. Nov2008, Vol. 111 Issue 6, pM3-M3. 1/6p.
Autor:
Travis Scheponik, Seth Poulsen, Linda Oliva, Enis Golaszewski, Geoffrey L. Herman, Peter A. H. Peterson, Akshita Gorti, Alan T. Sherman
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9783030587024
NCS
NCS
We reflect on our ongoing journey in the educational Cybersecurity Assessment Tools (CATS) Project to create two concept inventories for cybersecurity. We identify key steps in this journey and important questions we faced. We explain the decisions w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9343c69d2ce7a1e0d8c06b9ccbbdab6c
https://doi.org/10.1007/978-3-030-58703-1_1
https://doi.org/10.1007/978-3-030-58703-1_1