Biblio

Export 6 results:
Filters: Author is Kevin Butler  [Clear All Filters]
2017
Bowers J, Reaves B, Sherman IN, Traynor P, Butler K.  2017.  Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :97--114.
2016
Tian D, Scaife N, Bates A, Butler K, Traynor P.  2016.  Making USB Great Again with USBFILTER. 25th USENIX Security Symposium (USENIX Security 16). :415--430.
2013
Kreuter B, Shelat A, Mood B, Butler K.  2013.  PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation. 22nd USENIX Security Symposium (USENIX Security 13). :321--336.
Carter H, Mood B, Traynor P, Butler K.  2013.  Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. 22nd USENIX Security Symposium (USENIX Security 13). :289--304.
2010
McDaniel P, Butler K, McLaughlin S, Sion R, Zadok E, Winslett M.  2010.  Towards a Secure and Efficient System for End-to-End Provenance. 2nd USENIX Workshop on the Theory and Practice of Provenance (TaPP 10).