Henry Carter

Orcid: 0000-0002-8061-7515

According to our database1, Henry Carter authored at least 18 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Outsourcing computation for private function evaluation.
Int. J. Inf. Comput. Secur., 2019

Security in Plain TXT - Observing the Use of DNS TXT Records in the Wild.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
OnionDNS: a seizure-resistant top-level domain.
Int. J. Inf. Sec., 2018

2017
Phonion: Practical Protection of Metadata in Telephony Networks.
Proc. Priv. Enhancing Technol., 2017

2016
Efficient techniques for secure multiparty computation on mobile devices.
PhD thesis, 2016

Outsourcing secure two-party computation as a black box.
Secur. Commun. Networks, 2016

Secure outsourced garbled circuit evaluation for mobile devices.
J. Comput. Secur., 2016

OPFE: Outsourcing Computation for Private Function Evaluation.
IACR Cryptol. ePrint Arch., 2016

CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Efficient and secure template blinding for biometric authentication.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
Proceedings of the 24th USENIX Security Symposium, 2015

More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

OnionDNS: A seizure-resistant top-level Domain.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
For your phone only: custom protocols for efficient secure function evaluation on mobile devices.
Secur. Commun. Networks, 2014

Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices.
IACR Cryptol. ePrint Arch., 2014

2011
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2007
ResDesk: An automated solution for course reserves request tracking and process management.
Libr. Hi Tech, 2007


  Loading...