Παρακολούθηση
Henry (Hank) Carter
Henry (Hank) Carter
Άγνωστη συνεργασία
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα gatech.edu
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
N Scaife, H Carter, P Traynor, K Butler
IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
6192016
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2492011
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1402016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
IEEE European Symposium on Security and Privacy (Euro S&P), 2016
1242016
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
772015
Whitewash: outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
682014
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
B Reaves, E Shernan, A Bates, H Carter, P Traynor
24th USENIX Security Symposium (USENIX Security 15), 2015
432015
Outsourcing Secure Two-Party Computation as a Black Box
H Carter, B Mood, P Traynor, K Butler
The 14th International Conference on Cryptology and Network Security, 2015
392015
For your phone only: custom protocols for efficient secure function evaluation on mobile devices
H Carter, C Amrutkar, I Dacosta, P Traynor
Security and Communication Networks 7 (7), 1165-1176, 2014
38*2014
2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)
N Scaife, H Carter, P Traynor, KR Butler
Nara, Japan, 2016
222016
Malware detection via data transformation monitoring
WN Scaife, PG Traynor, H Carter, K Butler
US Patent 10,685,114, 2020
212020
OnionDNS: A Seizure-Resistant Top-Level Domain
N Scaife, H Carter, P Traynor
IEEE Conference on Communications and Network Security (CNS), 2015
192015
Phonion: Practical protection of metadata in telephony networks
S Heuser, B Reaves, PK Pendyala, H Carter, A Dmitrienko, W Enck, ...
Proceedings on Privacy Enhancing Technologies, 2017
172017
Security In Plain TXT
A Portier, H Carter, C Lever
International Conference on Detection of Intrusions and Malware …, 2019
11*2019
Outsourcing computation for private function evaluation
H Carter, P Traynor
International Journal of Information and Computer Security 11 (6), 525-561, 2019
5*2019
Efficient and Secure Template Blinding for Biometric Authentication
S Deshmukh, H Carter, G Hernandez, P Traynor, K Butler
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), 2016
42016
EFFICIENT TECHNIQUES FOR SECURE MULTIPARTY COMPUTATION ON MOBILE DEVICES
HL Carter
Georgia Institute of Technology, 2015
32015
Improved Sliding Shortest Path Algorithm: Performance Analysis
H Carter, R Bhandari
Congressus Numerantium, 69–81, 2011
12011
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–18