Nathaniel Husted
Nathaniel Husted
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei indiana.edu
Titel
Zitiert von
Zitiert von
Jahr
Mobile location tracking in metro areas: malnets and others
N Husted, S Myers
Proceedings of the 17th ACM conference on Computer and communications …, 2010
652010
Smartphone security limitations: conflicting traditions
N Husted, H Saïdi, A Gehani
Proceedings of the 2011 Workshop on Governance of Technology, Information …, 2011
482011
GPU and CPU parallelization of honest-but-curious secure two-party computation
N Husted, S Myers, A Shelat, P Grubbs
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
422013
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
N Husted, S Myers
LEET, 2011
162011
Android provenance: diagnosing device disorders
N Husted, S Quresi, A Gehani
5th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 13), 2013
152013
Pythia: a privacy aware, peer-to-peer network for social search
S Nilizadeh, N Alam, N Husted, A Kapadia
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
122011
The smuggling theory approach to organized digital crime
V Garg, N Husted, J Camp
2011 eCrime Researchers Summit, 1-7, 2011
72011
Emergent Properties & Security: The Complexity ofSecurity as a Science
N Husted, S Myers
Proceedings of the 2014 New Security Paradigms Workshop, 1-14, 2014
42014
Analysis techniques for exploring emergent vulnerabilities and attacks on mobile devices
NW Husted
Indiana University, 2014
32014
Facilitative and rememberative: novel incentive structures for increased exercise in interactive media
V Garg, EK Adams, N Husted, J Brown
ACM SIGCAS Computers and Society 44 (2), 11-15, 2014
12014
Facilitative and rememberative
V Garg, EK Adams, N Husted, J Brown
2014
The Internet and the Physical World
N Husted, S Myers, M Dhiman, M Jakobsson, B Gonçalves, M Conover, ...
The Death of the Internet, 197-241, 2012
2012
Mobile Health Forensics
N Husted, E Walton, C Justice, H Wu
2008
E-Voting System Design Using Unix Systems Theory
N Husted
2008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–14