Nathaniel Husted

According to our database1, Nathaniel Husted authored at least 8 papers between 2010 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Facilitative and rememberative: novel incentive structures for increased exercise in interactive media.
SIGCAS Comput. Soc., 2014

Emergent Properties & Security: The Complexity ofSecurity as a Science.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
Android Provenance: Diagnosing Device Disorders.
Proceedings of the 5th Workshop on the Theory and Practice of Provenance, 2013

GPU and CPU parallelization of honest-but-curious secure two-party computation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2011
Pythia: a privacy aware, peer-to-peer network for social search.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

The smuggling theory approach to organized digital crime.
Proceedings of the 2011 eCrime Researchers Summit, 2011

2010
Mobile location tracking in metro areas: malnets and others.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...