Export 12 results:
Filters: Author is Patrick Traynor  [Clear All Filters]
Reaves B, Blue L, Abdullah H, Vargas L, Traynor P, Shrimpton T.  2017.  AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. 26th USENIX Security Symposium (USENIX Security 17). :575--592.
Bowers J, Reaves B, Sherman IN, Traynor P, Butler K.  2017.  Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). :97--114.
Reaves B, Blue L, Traynor P.  2016.  AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels. 25th USENIX Security Symposium (USENIX Security 16). :963--978.
Tian D, Scaife N, Bates A, Butler K, Traynor P.  2016.  Making USB Great Again with USBFILTER. 25th USENIX Security Symposium (USENIX Security 16). :415--430.
Carter H, Mood B, Traynor P, Butler K.  2013.  Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. 22nd {USENIX} Security Symposium ({USENIX} Security 13). :289--304.
Buskey R, Larson J, Mizikovsky S, La Porta T, Traynor P.  2007.  PANEL. 16th {USENIX} Security Symposium ({USENIX} Security 07).