Henry (Hank) Carter
Henry (Hank) Carter
Unknown affiliation
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
N Scaife, H Carter, P Traynor, K Butler
IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
3712016
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1962011
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1142016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
IEEE European Symposium on Security and Privacy (Euro S&P), 2016
812016
Whitewash: outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
532014
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
International Conference on Detection of Intrusions and Malware, and …, 2015
482015
For your phone only: custom protocols for efficient secure function evaluation on mobile devices
H Carter, C Amrutkar, I Dacosta, P Traynor
Security and Communication Networks 7 (7), 1165-1176, 2014
37*2014
Outsourcing Secure Two-Party Computation as a Black Box
H Carter, B Mood, P Traynor, K Butler
The 14th International Conference on Cryptology and Network Security, 2015
282015
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
B Reaves, E Shernan, A Bates, H Carter, P Traynor
24th USENIX Security Symposium (USENIX Security 15), 2015
282015
OnionDNS: A Seizure-Resistant Top-Level Domain
N Scaife, H Carter, P Traynor
IEEE Conference on Communications and Network Security (CNS), 2015
152015
Phonion: Practical Protection of Metadata in Telephony Networks.
S Heuser, B Reaves, PK Pendyala, H Carter, A Dmitrienko, W Enck, ...
Proc. Priv. Enhancing Technol. 2017 (1), 170-187, 2017
122017
Malware detection via data transformation monitoring
WN Scaife, PG Traynor, H Carter, K Butler
62017
Security In Plain TXT
A Portier, H Carter, C Lever
International Conference on Detection of Intrusions and Malware …, 2019
52019
Outsourcing computation for private function evaluation
H Carter, P Traynor
International Journal of Information and Computer Security 11 (6), 525-561, 2019
32019
EFFICIENT TECHNIQUES FOR SECURE MULTIPARTY COMPUTATION ON MOBILE DEVICES
HL Carter
Georgia Institute of Technology, 2015
22015
Efficient and Secure Template Blinding for Biometric Authentication
S Deshmukh, H Carter, G Hernandez, P Traynor, K Butler
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), 2016
12016
Improved Sliding Shortest Path Algorithm: Performance Analysis
H Carter, R Bhandari
Congressus Numerantium, 69–81, 2011
12011
The system can't perform the operation now. Try again later.
Articles 1–17