Export 7 results:
Filters: Author is Carl A. Gunter  [Clear All Filters]
Tuncay GSeray, Qian J, Gunter CA.  2020.  See No Evil: Phishing for Permissions with False Transparency. 29th {USENIX} Security Symposium ({USENIX} Security 20). :415--432.
Duffy E, Nyemba S, Gunter CA, Liebovitz D, Malin B.  2013.  Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. 2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13).
Green J, Juen J, Fatemieh O, Shankesi R, Jin D, Gunter CA.  2011.  Reconstructing Hash Reversal based Proof of Work Schemes. 4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 11).
Zhang W, Gunter CA, Liebovitz D, Tian J.  2011.  Role Prediction Using Electronic Medical Record System Audits. 2nd {USENIX} Workshop on Health Security and Privacy (HealthSec 11).
Khan F, Gunter CA.  2010.  Tiered Incentives for Integrity Based Queuing. 2010 Workshop on the Economics of Networks, Systems, and Computation (NetEcon 10).
Gunter CA.  1999.  Domain-Specific Languages for Programming and Security in Active Networks. 2nd Conference on Domain-Specific Languages ({DSL} 99).