Journals
Dhananjay, Phatak; Oehler, Michael; Sherman, Alan T. A Conjunction, Language, and System Facets for Private Packet Filtering. SCIENCE, 2(2):98-114.
Chaum, D.; Carback, R.T.; Clark, J.; Essex, A.; Popoveniuc, S.; Rivest, R.L.; Ryan, P.; Shen, E.; Sherman, A.T.; Vora, P.L.: Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes, Information Forensics and Security, IEEE Transactions on, vol.4, no.4, pp.611-627, Dec. 2009
Fink, R.A.; Sherman, A.T.; Carback, R.; TPM Meets DRE: Reducing the Trust Base for Electronic Voting Using Trusted Platform Modules, Information Forensics, and Security, IEEE Transactions on, vol.4, no.4, pp.628-637, Dec. 2009
Chaum, D.; Essex, A.; Carback, R.; Clark, J.; Popoveniuc, S.; Sherman, A.; Vora, P.: Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting, Security & Privacy, IEEE, vol.6, no.3, pp.40-46, May-June 2008.
Sherman, A.T.; McGrew, D.A.: Key Establishment in Large Dynamic Groups Using One-Way Function Trees, Software Engineering, IEEE Transactions on, vol.29, no.5, pp. 444-458, May 2003.
Rabi, Muhammad; Sherman, Alan T.: An Observation on Associative One-Way Functions in Complexity Theory, Inf. Process. Lett. 64, 5 (December 1997), 239-244.
Cain, Thomas R., and Sherman, Alan T.: How to Break Gifford’s Cipher, Cryptologia, vol. 21, no. 3, pp237-286.
Ganesan, Ravi and Sherman, Alan T.: Statistical Techniques for Language Recognition: An Empirical Study Using Real and Simulated English, 1994, vol. 18, no. 4, pp289-331 .
Ganesan, Ravi and Sherman, Alan T.: Statistical Techniques for Language Recognition: An Introduction and Guide for Cryptanalysts, Cryptologia, 1993, vol. 17, no. 4, pp321-366.
Baldwin, Robert W., and Sherman, Alan T.: HOW WE SOLVED THE $100,000 DECIPHER PUZZLE (16 HOURS TOO LATE), Cryptologia, 1990, vol. 14, no. 3, pp258-284.
Conferences
Dykstra, Josiah, and Sherman, Alan T. Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform. In Proceedings of the DFRWS Annual Digital Forensics Research Conference, August 2013, Monterey, CA.
Leschke, Timothy R., and Nicholas, Charles. Change-Link 2.0: A Digital Forensic Tool for Visualizing Changes to Shadow Volume Data, Symposium on Visualization for Cyber Security (VizSec), October 14th, 2013, Atlanta Georgia.
Oehler, Michael, and Phatak, Dhananjay S. A Conjunction for Private Stream Searching. Internation Conference on Social Computing (SocialCom), September 8-14, 2013.
Oehler, Michael, and Phatak, Dhananjay. A Conjunction Filter for Private Stream Search. In Eight ASE/IEEE International Conference on Privacy, Security, Risk, and Trust (PASSAT’13), Washington, DC, 2013.
Oehler, Michael, and Phatak, Dhananjay. A Simulation of Document Detection Methods and Reducing False Positive for Private Stream Searching. In Eight International Workshop on Data Privacy Management (DPM’13), Egham, England, 2013.
Oehler, Michael, and Phatak, Dhananjay; Sherman, Alan T. A Private Packet Filtering Language for Cyber Defense. In Eight Annual Symposium on Information Assurance (ASIA’13), pages 46{55, Albany, New York, 2013.
Dykstra, Josiah, and Sherman, Alan T. Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Technique. In Proceedings of the DFRWS Annual Digital Forensics Research Conference, August 2012, Washington, DC., S90-S98.
Leschke, Timothy R., and Sherman, Alan T. Change-Link: A Digital Forensic Tool for Visualizing Changes to Directory Trees. Symposium on Visualization for Cyber Security (VizSec), October 15th, 2012, Seattle Washington.
Dykstra, Josiah and Sherman, Alan T.: Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies, Proceedings of the 2011 ADFSL Conference on Digital Forensics Security and Law, ASDFL, 2011, pp. 191-206.
Alan T. Sherman, Russell A. Fink, Richard Carback, David Chaum, “Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability” in Proceedings of the 2011 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE 2011), August 8, 2011, San Francisco, CA, United States.
Russell A. Fink, Alan T. Sherman, Alexander O. Mitchell, and David C. Challenger. 2011. Catching the Cuckoo: Verifying TPM Proximity using a Quote Timing Side-Channel. In Proceedings of the 4th International Conference on Trust and Trustworthy Computing (TRUST’11).
Michael Oehler, Dhananjay Phatak, and John Krautheim. 2010. Visualizing Your Key for Secure Phone Calls and Language Independence. In Proceedings of the Seventh International Symposium on Visualization for Cyber Security (VizSec ’10).
Richard Carback, David Chaum, Jeremy Clark, John Conway, Aleksander Essex, Paul Herrnson, Travis Mayberry, Stefan Popoveniuc, Ronald Rivest, Emily Shen, Alan Sherman, and Poorvi Vora. “Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.” 2010. USENIX Security 2010.
Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing, In Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010).
Krautheim, F.J.: Private Virtual Infrastructure for Cloud Computing. Workshop on Hot Topics in Cloud Computing. San Diego, CA; 2009
David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, “Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes” in Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop, August 1, 2008, San Jose, CA, United States.
Aleks Essex, Jeremy Clark, Richard T. Carback, and Stefan Popoveniuc. Punchscan in Practice: An E2E Election Case Study. 2007. In Online Proceedings of the 2007 University Voting Systems Competition (VoComp 2007)
Richard T. Carback, Stefan Popoveniuc, Alan T. Sherman, and David Chaum. Punchscan with Independent Ballot Sheets: Simplifying Ballot Printing and Distribution with Independently Selected Ballot Halves. 2007, In Pre-proceedings of the 2007 IAVoSS Workshop on Trustworthy Elections (WOTE 2007)
Aleks Essex, Jeremy Clark, Richard T. Carback, and Stefan Popoveniuc. Punchscan in Practice: An E2E Election Case Study. 2007, In Pre-proceedings of the 2007 IAVoSS Workshop on Trustworthy Elections (WOTE 2007)
Alan T. Sherman, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, A. Gunes Koru, Chris M. Law, Donald F. Norris, John Pinkston, Andrew Sears, and Dongsong Zhang, “An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study” in Proceedings from the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop, August 1, 2006, Vancouver, B.C., Canada.
Kevin Fisher, Richard T. Carback III, and Alan T. Sherman, “Punchscan: Introduction and System Definition of a High-Integrity Election System” in Proceedings of the 2006 Workshop on Trustworthy Elections, June 28-30, 2006, Robinson College, Cambridge, United Kingdom
Richard T. Carback, David Chaum, Jeremy Clark, Aleks Essex, Kevin Fisher, Ben Hosp, Stefan Popoveniuc, Jeremy Robin. Punchscan and VoComp. Rump Session of CRYPTO 2006
Sherman, Alan T., Brian O. Roberts, William E. Byrd, Matthew R. Baker, John Simmons, “Developing and delivering hands-on information assurance exercises: Experiences with the Cyber Defense Lab at UMBC” in Proceedings of the Fifth IEEE Systems, Man and Cybernetics Information Assurance Workshop, June 10-11, 2004, West Point, New York, IEEE (Piscataway, NY, 2004), 242-249.
Dinsmore, P.T.; Balenson, D.M.; Heyman, M.; Kruus, P.S.; Scace, C.D.; Sherman, A.T.: Policy-based Security Management for Large Dynamic Groups: An Overview of the DCCM Project, DARPA Information Survivability Conference, and Exposition, 2000. DISCEX ’00. Proceedings, vol.1, no., pp.64-73 vol.1, 2000.
Adcock, J.M.; Balenson, D.M.; Carman, D.W.; Heyman, M.; Sherman, A.T.: Trading Off Strength and Performance in Network Authentication: Experience with the ACSA Project, DARPA Information Survivability Conference, and Exposition, 2000. DISCEX ’00. Proceedings, vol.1, no., pp.127-139 vol.1, 2000.
Other Publications
Sherman, Alan T.; Smith, Warren D.; Carback, Richard T.: Scoring the Candidates; Technology Review, MIT, September/October 2008.
Krautheim, F.J., Phatak, D.S., Sherman, A.T.: Private Virtual Infrastructure: A Model for Trustworthy Utility Cloud Computing. TR-CS-10-04. University of Maryland Baltimore County, Baltimore, MD (2010)
Doctoral Dissertations
Dykstra, J.: Digital Forensics for Infrastructure-as-a-Service Cloud Computing. Ph.D. diss. University of Maryland Baltimore County, Baltimore, MD (2013)
Fink, R.A.: Applying Trustworthy Computing to End-To-End Electronic Voting. Ph.D. diss. University of Maryland Baltimore County, Baltimore, MD (2010)
Carback, R.T.: Engineering Practical End-to-End Verifiable Voting Systems. Ph.D. diss. University of Maryland Baltimore County, Baltimore, MD (2010)
Krautheim, F.J.: Building Trust into Utility Cloud Computing. Ph.D. diss. University of Maryland Baltimore County, Baltimore, MD (2010)
Das, K.: Privacy Preserving Distributed Data Mining based on Multi-objective Optimization and Algorithmic Game Theory. Ph.D. diss. University of Maryland Baltimore County, Baltimore, MD (2009)
Master’s Theses
Nguyen, C.D.: Fast Modular Exponentiation Using Residue Domain Representation: A Hardware Implementation and Analysis. Master’s thesis. University of Maryland Baltimore County, Baltimore, MD (2013)
Joshi, N.D.: Experimental Evaluation and Implementation of the Spread Identity Framework. Master’s thesis. University of Maryland Baltimore County, Baltimore, MD (2011)
Newton, W.: Chaum’s Protocol for Detecting Man-in-the-Middle: Explanation and Discussion. Master’s thesis. University of Maryland Baltimore County, Baltimore, MD (2010)
Relan, V.G.: Location Authentication through Power Line Communication: Design, Protocol, and Analysis of a New Out-of-Band Strategy. Master’s thesis. University of Maryland Baltimore County, Baltimore, MD (2010)
Sonawane, B.E.: Spread Identity: A New Dynamic Address Remapping Mechanism for Anonymity and DDoS Defense. Master’s thesis. University of Maryland Baltimore County, Baltimore, MD (2010)
Carback, R.T.: Security Innovations in the Punchscan Voting System. Master’s thesis. University of Maryland Baltimore County, Baltimore, MD (2008)
Stone, A.B.: EBIDS-SENLP: A System to Detect Social Engineering Email Using Natural Language Processing. Master’s thesis. University of Maryland Baltimore County, Baltimore, MD (2007)