Nathaniel Husted
Nathaniel Husted
Zugehörigkeit unbekannt
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Mobile location tracking in metro areas: malnets and others
N Husted, S Myers
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Smartphone security limitations: conflicting traditions
N Husted, H Saïdi, A Gehani
Proceedings of the 2011 Workshop on Governance of Technology, Information …, 2011
GPU and CPU parallelization of honest-but-curious secure two-party computation
N Husted, S Myers, A Shelat, P Grubbs
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
Why {Mobile-to-Mobile} Wireless Malware Won't Cause a Storm
N Husted, S Myers
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
Android provenance: diagnosing device disorders
N Husted, S Quresi, A Gehani
5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13), 2013
Pythia: a privacy aware, peer-to-peer network for social search
S Nilizadeh, N Alam, N Husted, A Kapadia
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
Emergent Properties & Security: The Complexity ofSecurity as a Science
N Husted, S Myers
Proceedings of the 2014 New Security Paradigms Workshop, 1-14, 2014
The smuggling theory approach to organized digital crime
V Garg, N Husted, J Camp
2011 eCrime Researchers Summit, 1-7, 2011
Smuggling theory approach to organized digital crime. In eCrime Researcher’s Summit
V Garg, N Husted, J Camp
IEEE, 2011
Facilitative and rememberative: novel incentive structures for increased exercise in interactive media
V Garg, EK Adams, N Husted, J Brown
ACM SIGCAS Computers and Society 44 (2), 11-15, 2014
Analysis techniques for exploring emergent vulnerabilities and attacks on mobile devices
NW Husted
Indiana University, 2014
Facilitative and rememberative
V Garg, EK Adams, N Husted, J Brown
Acm Sigcas Computers and Society 44 (2), 2014
The Internet and the Physical World
N Husted, S Myers, M Dhiman, M Jakobsson, B Gonçalves, M Conover, ...
The Death of the Internet, 197-241, 2012
Mobile Health Forensics
N Husted, E Walton, C Justice, H Wu
E-Voting System Design Using Unix Systems Theory
N Husted
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–15