[go: up one dir, main page]

Follow
Henry (Hank) Carter
Henry (Hank) Carter
Bergen County Academies
Verified email at gatech.edu
Title
Cited by
Cited by
Year
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
N Scaife, H Carter, P Traynor, K Butler
IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
7052016
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2672011
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1502016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
IEEE European Symposium on Security and Privacy (Euro S&P), 2016
1382016
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
International Conference on Detection of Intrusions and Malware, and …, 2015
872015
Whitewash: outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
702014
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
B Reaves, E Shernan, A Bates, H Carter, P Traynor
24th USENIX Security Symposium (USENIX Security 15), 2015
452015
Outsourcing Secure Two-Party Computation as a Black Box
H Carter, B Mood, P Traynor, K Butler
The 14th International Conference on Cryptology and Network Security, 2015
422015
For your phone only: custom protocols for efficient secure function evaluation on mobile devices
H Carter, C Amrutkar, I Dacosta, P Traynor
Security and Communication Networks 7 (7), 1165-1176, 2014
41*2014
Malware detection via data transformation monitoring
WN Scaife, PG Traynor, H Carter, K Butler
US Patent 10,685,114, 2020
242020
Phonion: Practical protection of metadata in telephony networks
S Heuser, B Reaves, PK Pendyala, H Carter, A Dmitrienko, W Enck, ...
Proceedings on Privacy Enhancing Technologies, 2017
192017
OnionDNS: A Seizure-Resistant Top-Level Domain
N Scaife, H Carter, P Traynor
IEEE Conference on Communications and Network Security (CNS), 2015
182015
Security In Plain TXT
A Portier, H Carter, C Lever
International Conference on Detection of Intrusions and Malware …, 2019
172019
Efficient and Secure Template Blinding for Biometric Authentication
S Deshmukh, H Carter, G Hernandez, P Traynor, K Butler
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), 2016
72016
Outsourcing computation for private function evaluation
H Carter, P Traynor
International Journal of Information and Computer Security 11 (6), 525-561, 2019
5*2019
EFFICIENT TECHNIQUES FOR SECURE MULTIPARTY COMPUTATION ON MOBILE DEVICES
HL Carter
Georgia Institute of Technology, 2015
32015
Improved Sliding Shortest Path Algorithm: Performance Analysis
H Carter, R Bhandari
Congressus Numerantium, 69–81, 2011
22011
For Your Phone Only: Custom Protocols for Efficient Secure Function Evaluation on Mobile Devices (Preprint)
H Carter, C Amrutkar, I Dacosta, P Traynor
2012
Procedures Procedural Education Arterial Line Central Line Chest Tube Cricothyrotomy Lumbar Puncture Procedural Sedation Regional Anesthesia Transvenous Pacemaker IC Cordes …
HV Carter
J Trauma 53 (3), 602-615, 2002
2002
Prehospital EMS Air Care Education Air Care Equipment Air Care Medications Air Care Procedures Air Care Quick Reference Air Care Nuts & Bolts Air Care Safety Air Care Secure …
HV Carter
J Trauma 53 (3), 602-615, 2002
2002
The system can't perform the operation now. Try again later.
Articles 1–20