Biblio

Export 7 results:
Filters: Author is Carl A. Gunter  [Clear All Filters]
2020
Tuncay GSeray, Qian J, Gunter CA.  2020.  See No Evil: Phishing for Permissions with False Transparency. 29th {USENIX} Security Symposium ({USENIX} Security 20). :415--432.
2013
Duffy E, Nyemba S, Gunter CA, Liebovitz D, Malin B.  2013.  Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. 2013 {USENIX} Workshop on Health Information Technologies (HealthTech 13).
2011
Green J, Juen J, Fatemieh O, Shankesi R, Jin D, Gunter CA.  2011.  Reconstructing Hash Reversal based Proof of Work Schemes. 4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 11).
Zhang W, Gunter CA, Liebovitz D, Tian J.  2011.  Role Prediction Using Electronic Medical Record System Audits. 2nd {USENIX} Workshop on Health Security and Privacy (HealthSec 11).
2010
Khan F, Gunter CA.  2010.  Tiered Incentives for Integrity Based Queuing. 2010 Workshop on the Economics of Networks, Systems, and Computation (NetEcon 10).
1999
Gunter CA.  1999.  Domain-Specific Languages for Programming and Security in Active Networks. 2nd Conference on Domain-Specific Languages ({DSL} 99).