throbber
Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 1 of 44 PageID #: 1193
`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 1 of 44 PagelD #: 1193
`
`EXHIBIT A
`
`EXHIBIT A
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 2 of 44 PageID #: 1194
`
`Curriculum Vitae
`July 3, 2016
`
`Alan Theodore Sherman
`
`Personal Data
`
`Date of birth: February 26, 1957
`Place of birth: Cambridge, Massachusetts
`Citizenship: USA
`Marital status: married, children born 1996 and 2003
`
`Research Areas
`Security of voting systems, cryptology, information assurance, discrete algorithms,
`cybersecurity education.
`
`Education
`
`Feb. 1987 MIT, computer science
`Ph.D.
`June 1981 MIT, electrical engineering and computer science
`S.M.
`June 1978 Brown University, mathematics, magna cum laude
`Sc.B.
`H.S. Diploma June 1974 Lafayette High School, salutatorian, Williamsburg, Va.
`
`Experience in Higher Education
`
`July 2014–present. University of Maryland, Baltimore County (UMBC),
`Baltimore, Maryland. Professor of Computer Science (with tenure), Depart-
`ment of Computer Science and Electrical Engineering.
`July 1995–June 2014. University of Maryland, Baltimore County (UMBC),
`Baltimore, Maryland. Associate Professor of Computer Science (with tenure),
`Department of Computer Science and Electrical Engineering.
`August 1989–July 1995. University of Maryland, Baltimore County (UMBC), Bal-
`timore, Maryland. Assistant Professor of Computer Science, Computer Sci-
`ence Department.
`September 1986–August 1989. Tufts University, Medford, Massachusetts. Assis-
`tant Professor of Computer Science, Department of Computer Science.
`September 1985–August 1986. Tufts University, Medford, Massachusetts. Instruc-
`tor of Computer Science, Department of Computer Science.
`January 1979–January 1982. Massachusetts Institute of Technology (MIT), Cam-
`bridge, Massachusetts. Teaching Assistant, Department of Electrical Engi-
`neering and Computer Science.
`
`1
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 3 of 44 PageID #: 1195
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`2
`
`Experience Outside of Higher Education
`
`A. Consulting and Contracting
`
`August 2015–date. Wood Law, LLP, Kansas City, MO. Serving as cryptologic ex-
`pert witness for plaintiff in Alexander and Symington vs. BF Labs, a class-
`action consumer protection case. Wrote a report estimating the number of
`Bitcoins mined by BF Labs using special-purpose hardware.
`
`August 2014–March 2015. Lerner, David, Littenberg, Krumholz & Mentlik, LLP,
`NJ. Served as cryptologic expert witness for SPA Syspatronic in SPA Sys-
`patronic vs. U.S. in patent litigation involving cryptographic portable data-
`carrying devices.
`
`July 2014–January 2016. Blank Rome, Washington, DC. Serving as cryptologic
`expert witness for Strike Force in Strike Force vs. Phone Factor in patent
`litigation involving multi-channel authentication. Wrote validity and infringe-
`ment reports.
`
`May 2014–July 2015. Sidley Austin, Washington, DC. Served as cryptologic expert
`witness on invalidity for Apple in Content Guard vs. Apple in patent litigation
`involving digital rights management. Wrote invalidity IPRs.
`
`May 2013–March 2014. Kirkland & Ellis, Chicago, IL. Served as a cryptologic ex-
`pert witness on invalidity for Apple in Intertrust vs. Apple in patent litigation
`involving digital rights management. Wrote invalidity reports in support of
`five IPRs.
`
`May 2013–May 2014. Perkins Coie, Seattle, WA. Served as a cryptologic expert
`witness on non-infringement for McAfee in Uniloc vs. McAfee in patent liti-
`gation involving product activation (via Rubin Anders).
`
`April 2013–June 2013. Quinn Emanuel, Redwood Shores, CA. Researched prior
`art as expert cryptologic witness for IBM in Softvault vs. IBM in a patent
`litigation matter involving embedded controllers(via Thomson Reuters).
`
`June 2012–December 2014. Kirkland & Ellis, Chicago, IL. Analyzed the validity
`of two cryptographic patents dealing with streaming media for Wowza Media
`Systems in Adobe vs. Wowza. Wrote invalidity and security reports and was
`deposed as expert witness.
`
`April 2012–September 2013. Morgan, Lewis & Brockius, Houston, TX. Provided
`technical advice on prior art for Rite Aid in TQP Development vs. DirectTV,
`et al. (via Thomson Reuters, Rockville, MD).
`
`October 2011–March 2012. Fish & Richardson, Boston, MA. Devised a technical
`work-around for Microsoft in the second damages phase of Uniloc vs. Microsoft
`concerning a patent for product activation, helping to reduce damages from
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 4 of 44 PageID #: 1196
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`3
`
`$388 million to an amount reported to be about $80 million. Wrote report
`and was deposed as expert witness.
`
`July 2008–May 2010. ID2P Technologies, Inc., Lake Forest, CA. Evaluated the
`security of the SafeIDKey Authentication Device.
`
`July 2008–July 2009. Kenyon & Kenyon, New York City, Provided technical advice
`as expert witness for Sony in Certicom vs. Sony.
`
`August–September 2007; July 2008–January 2009. Kirkland & Ellis, New York
`City. Provided technical advice as expert witness concerning a cryptographic
`patent.
`
`July 2006–April 2007. WilmerHale, Boston, Massachusetts and Washington, DC
`(via Silicon Valley Expert Witness Group, Inc., Washington, DC). Provided
`technical advice as expert witness for RSA in PRISM vs. RSA Security, Inc.,
`et al., in which PRISM alleged patent infringement.
`
`July 2006–April 2007. State of Maryland, Attorney General’s Office, Baltimore,
`Maryland. Wrote report and provided technical advice as expert witness in
`Shade vs. State of Maryland State Board of Elections, et al., in which Shade
`sought to decertify the Diebold AccuvoteTS electronic voting system on the
`basis of poor security.
`
`July 2005. State of Maryland, Attorney General’s Office, Baltimore, Maryland.
`Testified as an expert witness in Fox vs. State of Maryland Department of
`Budget and Management, in which Fox sought access under FOIA to the
`unredacted SAIC report on the security of the Diebold AccuvoteTS electronic
`voting system.
`
`May 2005. 2factor, L.L.C, Centreville, Virginia. Evaluated the security of the 2fac-
`tor Authentication and Key-Management System.
`
`August 4, 1997–April 2003. Cryptologic Consultant, NAI Labs at Network Asso-
`ciates, Inc., Rockville, Maryland—formerly Advanced Research and Engineer-
`ing Division of Trusted Information Systems (TIS), Inc. Analyzed the secu-
`rity of the TIS RecoverKey product and performed cryptographic research
`in support of DARPA and other government contracts on key management
`for large dynamic groups, ultra-fast network authentication, and distributed
`sensor networks. Contractual arrangements last made through TAC World-
`wide Companies. Supervisors: Dennis K. Branstad, David Balenson, Pete
`Dinsmore, Michael St. Johns.
`
`July–August 2002. LuxSAT, Inc., Luxenburg, Netherlands. Evaluated security of
`a multimedia-on-demand broadcast system. Via Plus Five Consulting, Palo
`Alto, CA. Point of Contact: Robert W. Baldwin.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 5 of 44 PageID #: 1197
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`4
`
`January 2002. InfoScape Corporation, Redmond, WA. Evaluated the security of
`protocols in InfoScape Technologies. Via Plus Five Consulting, Palo Alto,
`CA. Point of Contact: Robert W. Baldwin.
`
`September 2001. Phoenix Technologies, San Jose, CA. Evaluated the security of
`the FirstAuthority StrongROM and StrongClient products. Point of contact:
`Sameer Mathur.
`
`March 27, 1997. Science Applications International Corporation (SAIC), McLean,
`Virginia. Science & Technology Assessment Division. Advised government
`agencies on the impact of technology advances on cryptography and signals
`intelligence for the year 2010.
`
`March 28, 1991. Synchronetics, Baltimore, Maryland. Suggested improvements to
`text-retrieval algorithms used in an automatic system that converts linear
`text to hypertext. Coordinated through the Technology Extension Service,
`University of Maryland.
`
`October 5 and 23, 1990. Digital Systems Corporation, Walkersville, Maryland.
`Outlined a cryptographic scheme to authenticate control
`signals
`for
`electronically-operated vault doors. Coordinated through the Technology Ex-
`tension Service, University of Maryland.
`
`July 10–12, 1982. Mattel Inc., Hawthorne, California. Consultant, Mattel Toys.
`Devised a cryptographic method to authenticate electronic game scores on a
`4-bit microprocessor.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 6 of 44 PageID #: 1198
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`5
`
`B. Research Appointments
`
`2006–2009. Member, National Center for the Study of Elections, UMBC.
`
`August 1995–August 1998; August 1989–October 1992. Joint appointment, Uni-
`versity of Maryland Institute for Advanced Computer Studies (UMIACS),
`University of Maryland College Park, College Park, Maryland.
`
`September 1985–August 1988. MIT Laboratory for Computer Science, 545 Tech-
`nology Square, Cambridge, Massachusetts. Research Affiliate, Theory of Com-
`putation Research Group.
`
`June 1979–August 1985. MIT Laboratory for Computer Science, 545 Technology
`Square, Cambridge, Massachusetts. Research Assistant. Performed research
`in cryptology and VLSI layout algorithms under the supervision of Professor
`Ronald L. Rivest.
`
`C. Other Employment
`
`Summer 1977. Computer Sciences Corporation, NASA Langley Research Center,
`Hampton, Virginia. Programming Aide. Helped maintain and improve nav-
`igation, guidance, and flight control software for computers aboard NASA’s
`Boeing 737 experimental research airplane.
`
`Summers 1974–1976. Colonial Williamsburg Foundation, Williamsburg, Virginia.
`Interpreter at Magazine. Guided tours through historic powder magazine
`and demonstrated firing the Brown Bess musket while dressed in eighteenth-
`century apparel.
`
`Summer 1974. NASA Langley Research Center, Hampton, Virginia. Participant,
`Career Exploration Program. Analyzed three algorithms used to compute
`trigonometric functions on a navigation flight computer aboard NASA’s 737
`experimental research airplane. Supervisor: Dr. Terry A. Straeter.
`
`October 1965–September 1974. Colonial Williamsburg Foundation, Williamsburg,
`Virginia. Member, Colonial Williamsburg Fife and Drum Corps (Fife
`Sergeant, November 1972–September 1974). Played fife in hundreds of parades
`and ceremonies. Duties as Fife Sergeant included supervising and rehearsing
`the senior corps’s fife section and helping oversee fife instruction for the junior
`corps.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 7 of 44 PageID #: 1199
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`6
`
`Honors Received
`
`Awards for Scholarship
`• Outstanding Case Study Award for 2012 by the American Academy of
`Forensic Sciences, based on a paper by Josiah Dykstra and Alan T. Sher-
`man published in the Journal of Network Forensics.
`• Listed in the following Who’s Who publications by Marquis:
`Who’s Who in America
`Who’s Who in the East, 25–26th+ editions (94–96+)
`Who’s Who in Science and Engineering, 2nd edition (94+)
`Who’s Who in American Education, 3rd–5th+ editions editions (92–95+)
`Who’s Who in the Media
`• Member, Sigma Xi, MIT (April 1981).
`• Fellowship, German Academic Exchange Office (June 1978). To attend a
`Goethe Institute Summer Language Program.
`• Member, Phi Beta Kappa, Brown University (April 1978).
`• Member, Sigma Xi, Brown University (March 1978).
`
`Teaching Awards
`• Senior Class Award, Tufts University (May 1986). Awarded primarily for
`teaching CSC–150c Cryptology, fall 1985.
`• Forgivable Loan, General Electric Foundation/Ford Foundation, MIT
`(November 1983). Awarded primarily for excellence in teaching at MIT.
`
`Other Awards and Accomplishments
`• Meritorious Service Award, United States Chess Federation (August
`1997). For contributions to college chess.
`• Promoted to the rank of shodan (first-degree black belt) in the Japanese
`martial art of Tomiki Aikido, as certified by the Japan Aikido Association
`(February 1995).
`• Top Faculty Chess Player, Pan-American Open (1993, 1994, 1998,
`1999[tie], 2001).
`• Erd¨os Number 3: One path of coauthorships to Paul Erd¨os is via Andrew
`Odlyzko and Ronald Rivest.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 8 of 44 PageID #: 1200
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`7
`
`Funding
`
`External — Research
`• October 1, 2016–December 30, 2017, $199,368. National Initiative for
`Cybersecurity Eduation, National Institute of Standards and Technology.
`Principal Investigator, “Connecting Universities, Secondary Schools, and
`Employers to Promote Cybersecurity Awareness, Internships, Research
`Opportunities, and Career Paths” (Steve Morrill, Co-PI for subaward to
`Loyola Blakefield). At UMBC, in preparation.
`• September 1, 2016–August 31, 2018, $650,212. National Sceince Founda-
`tion. Principal Investigator, “Building SFS Relationships between Com-
`munity Colleges and Four-Year Schools: A Research-Based Cohort Ap-
`proach” (Casey O’brien, CoPI for subaward to Prince George’s Commu-
`nity College; Beatrice Lauman, CoPI for subaward to Montgomery Col-
`lege). At UMBC, pending.
`• September 1, 2015–August 31, 2016, $146,917 (amount for research:
`$146,917.). National Security Agency. Principal Investigator, “Creat-
`ing Concept and Curriculum Assessment Tools for Cybersecurity” (Linda
`Oliva and Dhnanjay Phatak, CoPIs. Geoffrey Herman, CoPI, for a col-
`laborative grant with Univeristy of Illinois). At UMBC.
`• August 2013–August 2014, $271,435 (amount for research: $271,435). Na-
`tional Science Foundation. Principal Investigator, “Supplement to UMBC
`Cybersecurity Scholarship for Service Program and Innovations in Cyber-
`security Education Workshop Series” (Richard Forno CoPI). Supports
`two research projects, each with GRA: SecurityEmpire educational mul-
`tiplayer computer game, and verifiable randomness. At UMBC.
`• August 2013–July 2015, $44,206 (non-participant cost amount for re-
`search: $28,574). National Science Foundation. Co-Principal Investi-
`gator, “INSuRE EAGER” (Melissa Dark, Purdue, PI). At UMBC (sub-
`contract from Purdue).
`• August 2012–August 2017, $2,542,169 (non-participant cost amount for
`research: $293,864). National Science Foundation. Principal Investigator,
`“UMBC Cybersecurity Scholarship for Service Program and Innovations
`in Cybersecurity Education Workshop Series” (Richard Forno CoPI). At
`UMBC.
`• August 2012–December 2013, $83,280 (amount for research: $83,280). Na-
`tional Security Agency. Principal Investigator, “University of Maryland,
`Baltimore County (UMBC) Information Assurance Scholarship Program
`2012-2013” (Richard Forno Co-PI). Research funds are for the project,
`“Teaching information assurance concepts to high school students through
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 9 of 44 PageID #: 1201
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`8
`
`our new social media game SecurityEmpire: Outreach to academia” (Marc
`Olano and Linda Oliva, Co-Investigators). At UMBC.
`• August 2011–December 2012, $85,537 (amount for research: $85,463). Na-
`tional Security Agency. Principal Investigator, “University of Maryland,
`Baltimore County (UMBC) Information Assurance Scholarship Program
`2011-2012” (Richard Forno Co-PI). At UMBC. Research funds are for the
`project, “Teaching information assurance concepts to high school students
`through a new social media game: Outreach to academia” (Marc Olano
`and Linda Oliva, Co-Investigators). At UMBC.
`• August 2010–December 2011, $74 (amount for research: $0). National Se-
`curity Agency. Principal Investigator, “University of Maryland, Baltimore
`County (UMBC) Information Assurance Scholarship Program 2010-2011”
`(John Pinkston Co-PI). At UMBC.
`• September 2009–December 2010, $19,205 (amount for research: $0). Na-
`tional Security Agency. Principal Investigator, “DoD IASP Scholarships
`at UMBC” (John Pinkston Co-PI). At UMBC.
`• September 2008–September 2013, ∼$7,500,000 (my portion: ∼$25,000–
`50,000). Multi-Disciplinary University Research Initiative (MURI),
`AFOSR. Investigator (Tim Finin, PI), “A framework for managing the
`assured information sharing lifecycle.” At UMBC.
`• September 2008–September 2009, $66,346 (amount for research: $0) Na-
`tional Security Agency. Principal Investigator, “DoD IASP Scholarships
`at UMBC,” (John Pinkston Co-PI). At UMBC.
`• September 13, 2007–September 12, 2008, $36,300 (amount for research:
`$30,583 ) National Security Agency. Principal Investigator, “DoD IASP
`Scholarships at UMBC,” (John Pinkston Co-PI). At UMBC.
`• October 1, 2006–September 30, 2007, $29,940. National Science Foun-
`dation, Principal Investigator, “SGER: CT-ISG: The VoComp University
`Voting Systems Competition.” At UMBC.
`• September 15, 2006–January 30, 2008 $65,646 (amount for research:
`$11,760). National Security Agency. Principal Investigator, “DoD IASP
`Scholarships at UMBC,” (John Pinkston Co-PI). At UMBC.
`• August 29, 2005–August 29, 2007, $63,833 (with extension), (amount for
`research: $21,014). National Security Agency. Principal Investigator,
`“DoD IASP Scholarships at UMBC,” (John Pinkston Co-PI). At UMBC.
`• September 14, 2004–September 14, 2006, $ 143,999 (with extension),
`(amount for research: $0). National Security Agency. Principal Inves-
`tigator, “DoD IASP Scholarships at UMBC,” (John Pinkston Co-PI). At
`UMBC.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 10 of 44 PageID #: 1202
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`9
`
`• August 2003–August 2004, $57,021 (amount for research: $53,449). Na-
`tional Security Agency. Principal Investigator, “DoD IASP Scholarship
`Grant, with NDU/IRMC Partnership” (John Pinkston Co-PI). At UMBC.
`• August 2002–August 2003, $120,384 (amount for research: $110,000). Na-
`tional Security Agency. Principal Investigator, “DoD IASP Scholarship
`Grant, with NDU/IRMC Partnership” (John Pinkston Co-PI). At UMBC.
`• Fall 2001–Summer 2002, $37,000 (amount for research: $37,000). Depart-
`ment of Defense. Principal Investigator (Peng Liu and John Pinkston
`Co-PIs), “Program Initiation Award,” for UMBC Center for Information
`Security and Assurance. At UMBC.
`• April 1997–April 1998, $43,735. National Security Agency. Investigator,
`“A security architecture for intelligent software agents: Adding security
`to KQML” (Tim Finin Co-Investigator). At UMBC (via subcontract from
`UMCP under Principal Investigator Joseph JaJa).
`• December 1, 1995–June 30, 1996, $35,597. IBM, Thomas J. Watson Re-
`search Center. Principal Investigator, “Efficient implementation of cryp-
`tographic algorithms for electronic commerce.” At UMBC.
`• Summer 1995, $6,283 (my portion). National Science Foundation (via
`subcontract from UMCP). Member, Maryland Collaborative for Teacher
`Preparation (MCTP). At UMBC.
`• March 1–September 1, 1995, $5,328. National Security Agency. Principal
`Investigator, “Maryland Theory Day at UMBC” (Co-Principal Investiga-
`tor: Richard Chang). Mathematical Sciences Program. At UMBC.
`• March 1–June 1, 1993, $3,860. National Science Foundation. Principal
`Investigator, “Maryland Theory Day at UMBC” (Co-Principal Investiga-
`tor: Richard Chang). Division of Computer and Computation Research,
`CCR-93-08170. At UMBC.
`• August 1989–August 1992, ∼$20,000 (50% Joint Appointment). Univer-
`sity of Maryland Institute for Advanced Computer Studies (UMIACS),
`Collegel Park. At UMBC.
`• March 15, 1988–August 31, 1989, $15,000. National Science Foundation.
`Investigator, “VLSI algorithms” in “Research instrumentation award for
`memory increase to Ncube parallel processor” (Co-Principal Investiga-
`tors: James G. Schmolze and Beth Adelson). Computer and Information
`Science and Engineering, CCR-87-16916. At Tufts University.
`
`Internal — Research
`• Summer 1990, $4,000. UMBC. Principal Investigator, “Relationships
`among algebraic and security properties of cryptographic functions.”
`Summer Faculty Fellowship. At UMBC.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 11 of 44 PageID #: 1203
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`10
`
`External — Research through Consulting
`
`Note: I helped write these grant proposals, which could not have been coor-
`dinated through UMBC in part because portions have a sensitive nature or
`because of other restrictions by the sponsor.
`• May 2011-November 2012, $25,000, U.S. Election Assistance Commission.
`Consultant (Richard Carback, PI), “Post-election auditing with voter-
`verified privacy preserving receipts.” At City of Takoma Park, MD.
`• September 2000–April 2001, $200,000, Contractor, extension to previous
`contract. [Project title and funding source withheld at request of client.]
`Through Maryland Procurement Office. At NAI Labs at Network Asso-
`ciates, Inc., Glenwood, MD.
`• Spring 2000, $200,000, Contractor. [Project title and funding source with-
`held at request of client.] Through Maryland Procurement Office. At NAI
`Labs.
`• July 1999–December 2001, ∼$1,500,000 (exact amount NAI sensitive).
`Defense Advanced Project Agency (DARPA). Contractor, “A communica-
`tions security architecture and cryptographic mechanisms for distributed
`sensor networks (SENSIT)” (David W. Carman, Principal Investigator).
`At NAI Labs.
`• September 1998–August 2000, ∼$1,500,000 (exact amount NAI sensi-
`tive). Defense Advanced Project Agency (DARPA). Contractor, “Adap-
`tive cryptographically synchronized authentication (ACSA)” (Dennis
`Branstad, then David Balenson, then David Carman, Co-Principal and
`Principal Investigators). At NAI Labs.
`• September 1997–December 2000, ∼$1,500,000 (exact amount NAI sen-
`sitive).
`Defense Advanced Project Agency (DARPA). Contractor,
`“Dynamic Cryptographically Context Management (DCCM)” (Dennis
`Branstad, then David Balenson, then Peter Dinsmore, Principal Inves-
`tigators). At NAI Labs.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 12 of 44 PageID #: 1204
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`11
`
`External — Chess
`• As Director of the UMBC Chess Program, I raised over $218,957 for
`UMBC Chess in over 38 grants, gifts, and awards from over 14 spon-
`sors (1995–present). Sponsors included The Abell Foundation, US Chess
`Federation, Connections Academy, and Maryland State Department of
`Education.
`
`Note: I was instrumental in gaining favorable publicity for UMBC with feature
`stories and appearances on the following national TV and radio shows about
`UMBC chess (selected):
`CNN Headline News (December ∼28, 1996—2.5 mins),
`NPR’s Morning Edition (May 9, 1997)—∼3 mins),
`ABC’s Good Morning America (March 3, 1999—3.5 mins),
`NBC’s Today Show (March 5, 2001—4.5 mins), and
`CNN’s Next (February 2002—3 mins),
`BBC World Radio (circa 2001)
`NPR’s “Maryland Morning with Sheilah Kast” (December 27, 2006).
`NPR’s “Tell Me More” (April 12, 2010–5.5 mins).
`I estimate that the cash value to UMBC (based on the cost of a comparable
`duration and type of national TV advertising) of this publicity exceeds five
`million dollars.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 13 of 44 PageID #: 1205
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`12
`
`Student Projects Supervised
`
`A. Ph.D. Dissertations—As Advisor (6)
`
`Farid Javani, “Formal methods for protocol discovery and analysis,” UMBC, in
`progress (expected May 2018). Thesis advisor.
`
`Christopher Nguyen, “Verifiable randomness with applications to voting,” UMBC,
`in progress (expected May 2017). Thesis advisor. [I fully supported Nguyen
`under my 2013 NSF grant in 2013-2014.]
`
`Edward J. Birrane, “Virtual circuit provisioning in challenged sensor internet-
`works: With application to the Solar System Internet,” Department of CSEE,
`UMBC, in progress (December 2014). Thesis co-advisor (with M. Younis).
`[The CSEE Dept. nominated Birrane for the 2014 ACM Dissertation Award.]
`
`Josiah Dykstra, “Digital forensics for cloud computing: Framework, tools, and le-
`gal analysis for Infrastructure-as-a-Service cloud computing,” Department of
`CSEE, UMBC (May 2013). Thesis advisor.
`[In May 2012, Dykstra won the
`Dept.’s CSEE Research Review award for best research by a PhD student.]
`
`Russell A. Fink, “Applying trustworthy computing to End-to-End electronic vot-
`ing,” Department of CSEE, UMBC (December 2010). Thesis advisor. [In May
`2008, Fink won the Dept.’s CSEE Research Review award for best research
`by a PhD student.]
`
`Richard T. Carback, “Engineering practical end-to-end election systems,” Depart-
`ment of CSEE, UMBC (December 2010). Thesis advisor.
`[In May 2011,
`Carback won the Dept.’s CSEE Research Review award for best research by
`a PhD student.]
`
`F. John Krautheim, “Building trust into utility cloud computing,” Department of
`CSEE, UMBC (May 2010). Thesis co-advisor (with D. Phatak).
`[I fully
`supported Krautheim under my DoD IASP grants.]
`
`Muhammad Rabi, “Relationships among algebraic and security properties of cryp-
`tographic functions, and a security architecture for intelligent agents” Com-
`puter Science Department, UMBC (August 1998). Thesis co-advisor (with T.
`Finin).
`
`B. Ph.D. Dissertations—As Reader
`
`Michael Oehler “Private packet filtering: Searching for sensitive indicators without
`revealing the indicators in collaborative environments,” Department of CSEE,
`UMBC (December 2013). Reader (Advisor: Phatak).
`
`Xiaonong Gu, “A new classification algorithm,” Math Department, UMBC (Octo-
`ber 1999). Reader (Advisor: Rukhin).
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 14 of 44 PageID #: 1206
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`13
`
`David M. Lazoff, “Network reliability and optimal resource allocation in dis-
`tributed database systems,” Department of Computer Science and Electrical
`Engineering, UMBC (August 1996). Reader (Advisor: Stephens).
`
`Zhi-Ming Lin, “DAVE: An automatic layout compiler for mixed analog/digital in-
`tegrated circuits,” Ph.D. Thesis, Department of Electrical Engineering, Uni-
`versity of Maryland College Park (1991). Reader.
`
`C. M.S. Theses and Projects1—As Advisor (23)
`
`Geet Parekh “Developing a concept inventory for cybersecurity,” MS Thesis,
`UMBC (August 2015). Thesis advisor.
`
`Chirag Shah “A usability study of the PICO authentication device: User reac-
`tions to Pico implemented on an Android phone,” MS Thesis, UMBC (August
`2014). Thesis advisor.
`
`Nathan Price “How to generate repeatable keys using Physical Unclonable Func-
`tions: Correcting PUF errors with iteratively broadening and prioritized
`search,” MS Thesis, UMBC (May 2014). Thesis advisor.
`[I fully supported
`Price under my NSF SFS grant.]
`
`Christopher Nguyen, “Fast modular exponentiation using residue domain represen-
`tation: A hardware implementation and analysis,” MS Thesis, UMBC (De-
`cember 2013). Thesis co-advisor (with D. Phatak).
`
`Nikhil Joshi, “Experimental evaluation and implementation of the Spread Identity
`Framework,” MS Thesis, UMBC (December 2011). Thesis co-advisor (with
`D. Phatak).
`
`William Newton, “Chaum’s protocol for detecting man-in-the-middle: Explana-
`tion, implementation, and analysis,” MS Thesis, UMBC (December 2010).
`Thesis advisor.
`
`Bhushan Sonawane, “Spread Identity: A new dynamic address translation mecha-
`nism for anonymity and DDoS defense,” MS Thesis, UMBC (December 2010).
`Thesis co-advisor (with D. Phatak).
`
`Vivek Relan, “Location authentication through powerline communication: Design,
`protocol, and analysis of a new out-of-band strategy,” MS Thesis, UMBC
`(December 2010). Thesis co-advisor (with D. Phatak).
`
`Richard Carback, “Security enhancements to the Punchscan voting system,” MS
`Thesis, UMBC (May 2008). Thesis advisor.
`
`1Prior to the merger of the CS and EE Departments at UMBC circa 1996, there was no thesis option
`for MS students in CS.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 15 of 44 PageID #: 1207
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`14
`
`Allen Stone, “OBID: An ontology-based intrusion-detection system,” MS Thesis,
`UMBC (May 2007). Thesis advisor.
`
`Kevin Fisher, “Security analysis of the Punchscan high-integrity voting system,”
`MS Thesis, UMBC (December 2006). Thesis advisor.
`
`Nicholas Dickerson, “Arpdefender: Detecting and recovering from ARP cache poi-
`soning attacks,” MS Thesis, UMBC (fall 2004). Thesis advisor.
`
`Anthony Falcone, “DTEL: A digital telestrator for spectator chess,” MS Thesis,
`UMBC (April 2000). Thesis advisor.
`
`Pavel Pasmanik, “Using more information from evaluation functions: An improve-
`ment to the Crafty chess program,” UMBC (December 1997). Chairperson,
`Advisory Committee.
`
`Ali Selcuk, “Linear cryptanalysis of RC-5,” MS Thesis, UMBC (December 1997).
`Thesis advisor.
`
`Qi He, “A new electronic cash scheme with flexible denominations,” MS Thesis,
`UMBC (May 1997). Thesis advisor.
`
`Bryan Olson, CMSC-693 Project, “A new radix sort,” Computer Science Depart-
`ment, UMBC (August 1995). Chairperson, Advisory Committee.
`
`Ravada Sivakumar, “Experimental analysis of a partitioning algorithm for the
`Steiner minimum tree problem in R2 and R3,” CMSC-693 Project, Computer
`Science Department, UMBC (August 1993), Chairperson, Advisory Commit-
`tee.
`
`Thomas R. Cain, “How to break Gifford’s cipher,” CMSC-693 Project, Computer
`Science Department, UMBC (April 1993), Chairperson, Advisory Committee.
`
`Katherine A. South, “Solving recurrences with generating functions: A tutorial,”
`CMSC-693 Project, Computer Science Department, UMBC (June 1993),
`Chairperson, Advisory Committee.
`
`Kirthivasan Venkatraman, “The vowel-count method in solving single columnar
`transposition ciphers: Its effectiveness and improvement,” CMSC-693 Project,
`Computer Science Department, UMBC (January 5, 1992). Chairperson, Ad-
`visory Committee.
`
`Konstantinos Kalpakis, “Refinements of a partitioning algorithm for the Steiner
`tree problem in d-dimensional Euclidean space,” CMSC-693 Project, Com-
`puter Science Department, UMBC (December 19, 1991). Chairperson, Advi-
`sory Committee.
`
`Kiran S. Panesar, “The vowel-count for solving single columnar transposition ci-
`phers: Quantification, analysis, and improved tests,” CMSC-693 Project,
`Computer Science Department, UMBC (August 21, 1991). Chairperson, Ad-
`visory Committee.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 16 of 44 PageID #: 1208
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`15
`
`Virginia Schneeman, “Simulated annealing and iterative improvement: An ex-
`perimental comparison,” CMSC-693 Project, Computer Science Department,
`UMBC (August 18, 1991). Chairperson, Advisory Committee.
`
`D. MS Theses—As Reader
`
`Jason Dowd, “Identifying malware using N -Gram clustering metrics,” MS Thesis,
`UMBC (August 2014). Reader (Advisor: Nicholas).
`
`Fahad Zafar, “Tiny encryption algorithm for cryptographic gradient noise,” MS
`Thesis, UMBC (December 2009). Reader (Advisor: Olano).
`
`Wei-cheng Lin, “Weak keys of the Data Encryption Standard: Regularities and
`cycle properties,” CMSC-693 Project, Computer Science Department, UMBC
`(May 15, 1990). Reader (Advisor: Sidhu).
`
`E. Undergraduate Theses
`
`Horace H. Dediu, “The design and implementation of a multiprocessor simulator,”
`honors thesis, Department of Electrical Engineering, Tufts University (fall
`1988). Reader.
`
`F. Independent Study Projects (selected)
`
`Travis Mayberry, “Implementation improvements to the Scantegrity II voting sys-
`tem,” CMSC-699: Independent study in computer science, Dept. of CSEE
`(spring 2010), UMBC.
`
`John Conway, “Implementation improvements to the Scantegrity II voting sys-
`tem,” CMSC-499: Independent study in computer science, Dept. of CSEE
`(spring 2010), UMBC.
`
`Michael Rushanan, “Range voting in practice,” CMSC-690: Independent study in
`computer science, Dept. of CSEE (spring 2009), UMBC.
`
`Brian Roberts, William Byrd, Matthew Baker, John Simmons, “Cyber Defense
`Exercises at UMBC” (summer 2003). Supervisor of summer lab assistants.
`
`Anthony Falcone, “Design and implementation of a digital telestrator for exhibi-
`tion chess matches,” CMSC-699: Independent Study in Computer Science,
`Dept. of CSEE (spring 98), UMBC.
`
`Michael D. Miller, “Course tools for CMSC-443: Cryptology,” independent study
`project (spring and summer 1995), UMBC.
`
`

`

`Case 6:16-cv-00095-RWS Document 45-2 Filed 11/30/16 Page 17 of 44 PageID #: 1209
`
`Alan T. Sherman, Curriculum Vitae—July 3, 2016
`
`16
`
`Brian E. Brzezicki and Uriel Nordenberg, “Hypermedia tools for teaching discrete
`mathematics,” non-credit independent study project (summer 94, fall 94),
`UMBC.
`
`Ann Pollack, “On the complexity of module orientation problems in VLSI layout,”
`CMSC-699: Independent Study in Computer Science, Computer Science De-
`partment, UMBC (spring 1994).
`
`David M. Lazoff, “An exact formula for the expected wire length between two ran-
`domly chosen terminals,” CMSC-699: Independent Study in Computer Sci-
`ence, Computer Science Department, UMBC (spring 1994).
`
`Predag Tosic, “

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket