Follow
Henry (Hank) Carter
Henry (Hank) Carter
Unknown affiliation
Verified email at gatech.edu
Title
Cited by
Cited by
Year
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data
N Scaife, H Carter, P Traynor, K Butler
IEEE International Conference on Distributed Computing Systems (ICDCS), 2016
6372016
(sp) iphone: Decoding vibrations from nearby keyboards using mobile phone accelerometers
P Marquardt, A Verma, H Carter, P Traynor
Proceedings of the 18th ACM conference on Computer and communications …, 2011
2492011
Secure outsourced garbled circuit evaluation for mobile devices
H Carter, B Mood, P Traynor, K Butler
Journal of Computer Security 24 (2), 137-180, 2016
1442016
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation
B Mood, D Gupta, H Carter, K Butler, P Traynor
IEEE European Symposium on Security and Privacy (Euro S&P), 2016
1272016
More guidelines than rules: CSRF vulnerabilities from noncompliant OAuth 2.0 implementations
E Shernan, H Carter, D Tian, P Traynor, K Butler
Detection of Intrusions and Malware, and Vulnerability Assessment: 12th …, 2015
792015
Whitewash: outsourcing garbled circuit generation for mobile devices
H Carter, C Lever, P Traynor
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
712014
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge
B Reaves, E Shernan, A Bates, H Carter, P Traynor
24th USENIX Security Symposium (USENIX Security 15), 2015
442015
Outsourcing Secure Two-Party Computation as a Black Box
H Carter, B Mood, P Traynor, K Butler
The 14th International Conference on Cryptology and Network Security, 2015
402015
For your phone only: custom protocols for efficient secure function evaluation on mobile devices
H Carter, C Amrutkar, I Dacosta, P Traynor
Security and Communication Networks 7 (7), 1165-1176, 2014
38*2014
2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS)
N Scaife, H Carter, P Traynor, KR Butler
Nara, Japan, 2016
222016
Malware detection via data transformation monitoring
WN Scaife, PG Traynor, H Carter, K Butler
US Patent 10,685,114, 2020
212020
OnionDNS: A Seizure-Resistant Top-Level Domain
N Scaife, H Carter, P Traynor
IEEE Conference on Communications and Network Security (CNS), 2015
192015
Phonion: Practical protection of metadata in telephony networks
S Heuser, B Reaves, PK Pendyala, H Carter, A Dmitrienko, W Enck, ...
Proceedings on Privacy Enhancing Technologies, 2017
172017
Security In Plain TXT
A Portier, H Carter, C Lever
International Conference on Detection of Intrusions and Malware …, 2019
13*2019
Outsourcing computation for private function evaluation
H Carter, P Traynor
International Journal of Information and Computer Security 11 (6), 525-561, 2019
5*2019
Efficient and Secure Template Blinding for Biometric Authentication
S Deshmukh, H Carter, G Hernandez, P Traynor, K Butler
The 2nd IEEE Workshop on Security and Privacy in the Cloud (SPC 2016), 2016
42016
EFFICIENT TECHNIQUES FOR SECURE MULTIPARTY COMPUTATION ON MOBILE DEVICES
HL Carter
Georgia Institute of Technology, 2015
32015
Improved Sliding Shortest Path Algorithm: Performance Analysis
H Carter, R Bhandari
Congressus Numerantium, 69–81, 2011
12011
A Novel Quantum-Backed Decision Vector Framework for Ransomware Detection Using Nonlinear Signal Entropy Mapping
P Knaapen, H Carter, C Davies, G Robinson, T Martin
2024
The system can't perform the operation now. Try again later.
Articles 1–19