Follow
Henry (Hank) Carter
Henry (Hank) Carter
Unknown affiliation
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
N Scaife, H Carter, P Traynor, K Butler
IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
4502016
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2102011
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1222016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
IEEE European Symposium on Security and Privacy (Euro S&P), 2016
962016
Whitewash: outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
572014
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
International Conference on Detection of Intrusions and Malware, and …, 2015
542015
For your phone only: custom protocols for efficient secure function evaluation on mobile devices
H Carter, C Amrutkar, I Dacosta, P Traynor
Security and Communication Networks 7 (7), 1165-1176, 2014
39*2014
Outsourcing Secure Two-Party Computation as a Black Box
H Carter, B Mood, P Traynor, K Butler
The 14th International Conference on Cryptology and Network Security, 2015
322015
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
B Reaves, E Shernan, A Bates, H Carter, P Traynor
24th USENIX Security Symposium (USENIX Security 15), 2015
302015
Phonion: Practical Protection of Metadata in Telephony Networks.
S Heuser, B Reaves, PK Pendyala, H Carter, A Dmitrienko, W Enck, ...
Proc. Priv. Enhancing Technol. 2017 (1), 170-187, 2017
142017
OnionDNS: A Seizure-Resistant Top-Level Domain
N Scaife, H Carter, P Traynor
IEEE Conference on Communications and Network Security (CNS), 2015
142015
Malware detection via data transformation monitoring
WN Scaife, PG Traynor, H Carter, K Butler
US Patent 10,685,114, 2020
122020
Security In Plain TXT
A Portier, H Carter, C Lever
International Conference on Detection of Intrusions and Malware …, 2019
52019
OPFE: Outsourcing computation for private function evaluation
H Carter, P Traynor
Cryptology ePrint Archive, 2016
32016
Efficient and Secure Template Blinding for Biometric Authentication
S Deshmukh, H Carter, G Hernandez, P Traynor, K Butler
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), 2016
22016
EFFICIENT TECHNIQUES FOR SECURE MULTIPARTY COMPUTATION ON MOBILE DEVICES
HL Carter
Georgia Institute of Technology, 2015
22015
Improved Sliding Shortest Path Algorithm: Performance Analysis
H Carter, R Bhandari
Congressus Numerantium, 69–81, 2011
12011
Outsourcing computation for private function evaluation
H Carter, P Traynor
International Journal of Information and Computer Security 11 (6), 525-561, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–18