USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 7 results:
Filters: Author is Carl A. Gunter [Clear All Filters]
See No Evil: Phishing for Permissions with False Transparency. 29th USENIX Security Symposium (USENIX Security 20). :415--432.
.
2020. CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition. 27th USENIX Security Symposium (USENIX Security 18). :49--64.
.
2018. Requirements and Design for an Extensible Toolkit for Analyzing EMR Audit Logs. 2013 USENIX Workshop on Health Information Technologies (HealthTech 13).
.
2013. Reconstructing Hash Reversal based Proof of Work Schemes. 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11).
.
2011. Role Prediction Using Electronic Medical Record System Audits. 2nd USENIX Workshop on Health Security and Privacy (HealthSec 11).
.
2011. Tiered Incentives for Integrity Based Queuing. 2010 Workshop on the Economics of Networks, Systems, and Computation (NetEcon 10).
.
2010. Domain-Specific Languages for Programming and Security in Active Networks. 2nd Conference on Domain-Specific Languages (DSL 99).
.
1999.