Export 6 results:
Filters: Author is Kevin Butler  [Clear All Filters]
Bowers J, Reaves B, Sherman IN, Traynor P, Butler K.  2017.  Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :97--114.
Tian D, Scaife N, Bates A, Butler K, Traynor P.  2016.  Making USB Great Again with USBFILTER. 25th USENIX Security Symposium (USENIX Security 16). :415--430.
Kreuter B, Shelat A, Mood B, Butler K.  2013.  PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. 22nd USENIX Security Symposium (USENIX Security 13). :321--336.
Carter H, Mood B, Traynor P, Butler K.  2013.  Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. 22nd USENIX Security Symposium (USENIX Security 13). :289--304.
McDaniel P, Butler K, McLaughlin S, Sion R, Zadok E, Winslett M.  2010.  Towards a Secure and Efficient System for End-to-End Provenance. 2nd USENIX Workshop on the Theory and Practice of Provenance (TaPP 10).