Carl A. Gunter
Carl A. Gunter
George and Ann Fisher Distinguished Professor, University of Illinois at Urbana-Champaign
Verified email at illinois.edu - Homepage
Title
Cited by
Cited by
Year
Semantics of programming languages: structures and techniques
CA Gunter
MIT press, 1992
10231992
The SwitchWare active network architecture
DS Alexander, WA Arbaugh, MW Hicks, P Kakkar, AD Keromytis, ...
IEEE Network 12 (3), 29-36, 1998
5201998
PLAN: A packet language for active networks
M Hicks, P Kakkar, JT Moore, CA Gunter, S Nettles
ACM International Conference on Functional Programming Languages (ICFP ’98 …, 1998
4591998
Semantic domains
CA Gunter, DS Scott
Handbook of Theoretical Computer Science, 633-674, 1990
4261990
A reference model for requirements and specifications
CA Gunter, EL Gunter, M Jackson, P Zave
IEEE Software 17 (3), 37-43, 2000
3842000
Inheritance as implicit coercion
V Breazu-Tannen, T Coquand, CA Gunter, A Scedrov
Information and computation 93 (1), 172-221, 1991
3351991
Dynamic Searchable Encryption via Blind Storage.
M Naveed, M Prabhakaran, CA Gunter
EEE Symposium on Security and Privacy, San Jose, CA 2014, 2014
3312014
Active network encapsulation protocol (ANEP)
DS Alexander, CA Gunter, AD Keromytis, G Minden, D Wetherall, ...
Active Networks Request for Comments, 1997
2831997
Toward a science of learning systems: a research agenda for the high-functioning Learning Health System
C Friedman, J Rubin, J Brown, M Buntin, M Corn, L Etheredge, C Gunter, ...
Journal of the American Medical Informatics Association 22 (1), 43-50, 2015
2732015
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2622017
Formal verification of standards for distance vector routing protocols
K Bhargavan, D Obradovic, CA Gunter
Journal of the ACM (JACM) 49 (4), 538-576, 2002
2412002
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources.
S Demetriou, X Zhou, M Naveed, Y Lee, K Yuan, XF Wang, CA Gunter
ISOC Network and Distributed System Security (NDSS ’15), 2015
2392015
Privacy in the genomic era
M Naveed, E Ayday, EW Clayton, J Fellay, CA Gunter, JP Hubaux, ...
ACM Computing Surveys (CSUR) 48 (1), 1-44, 2015
2342015
Identity, location, disease and more: Inferring your secrets from Android public resources
X Zhou, S Demetriou, D He, M Naveed, X Pan, XF Wang, CA Gunter, ...
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2122013
PLANet: An active internetwork
M Hicks, JT Moore, DS Alexander, CA Gunter, SM Nettles
IEEE Conference on Computer Communications (INFOCOM '99) 3, 1124-1133 vol. 3, 1999
1821999
Property inference attacks on fully connected neural networks using permutation invariant representations
K Ganju, Q Wang, W Yang, CA Gunter, N Borisov
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
1482018
Privacy and security in mobile health: a research agenda
D Kotz, CA Gunter, S Kumar, JP Weiner
Computer 49 (6), 22-30, 2016
1472016
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
MJ May, CA Gunter, I Lee
IEEE Computer Security Foundations Workshop (CSFW '06), 2006
1432006
Fear and logging in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
1412018
Verisim: Formal analysis of network simulations
K Bhargavan, CA Gunter, M Kim, I Lee, D Obradovic, O Sokolsky, ...
IEEE Transactions on Software Engineering (TOSE) 28 (2), 129-145, 2002
1402002
The system can't perform the operation now. Try again later.
Articles 1–20