Export 7 results:
Filters: Author is Carl A. Gunter  [Clear All Filters]
Tuncay GSeray, Qian J, Gunter CA.  2020.  See No Evil: Phishing for Permissions with False Transparency. 29th USENIX Security Symposium (USENIX Security 20). :415--432.
Duffy E, Nyemba S, Gunter CA, Liebovitz D, Malin B.  2013.  Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. 2013 USENIX Workshop on Health Information Technologies (HealthTech 13).
Green J, Juen J, Fatemieh O, Shankesi R, Jin D, Gunter CA.  2011.  Reconstructing Hash Reversal based Proof of Work Schemes. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
Zhang W, Gunter CA, Liebovitz D, Tian J.  2011.  Role Prediction Using Electronic Medical Record System Audits. 2nd USENIX Workshop on Health Security and Privacy (HealthSec 11).
Khan F, Gunter CA.  2010.  Tiered Incentives for Integrity Based Queuing. 2010 Workshop on the Economics of Networks, Systems, and Computation (NetEcon 10).
Gunter CA.  1999.  Domain-Specific Languages for Programming and Security in Active Networks. 2nd Conference on Domain-Specific Languages (DSL 99).