Mobile location tracking in metro areas: malnets and others N Husted, S Myers Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 80 | 2010 |
GPU and CPU parallelization of honest-but-curious secure two-party computation N Husted, S Myers, A Shelat, P Grubbs Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 57 | 2013 |
Smartphone security limitations: conflicting traditions N Husted, H Saïdi, A Gehani Proceedings of the 2011 Workshop on Governance of Technology, Information …, 2011 | 51 | 2011 |
Android provenance: diagnosing device disorders N Husted, S Quresi, A Gehani 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13), 2013 | 18 | 2013 |
Why {Mobile-to-Mobile} Wireless Malware Won't Cause a Storm N Husted, S Myers 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011 | 17 | 2011 |
Pythia: a privacy aware, peer-to-peer network for social search S Nilizadeh, N Alam, N Husted, A Kapadia Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011 | 13 | 2011 |
Emergent properties & security: The complexity ofsecurity as a science N Husted, S Myers Proceedings of the 2014 New Security Paradigms Workshop, 1-14, 2014 | 10 | 2014 |
The smuggling theory approach to organized digital crime V Garg, N Husted, J Camp 2011 eCrime Researchers Summit, 1-7, 2011 | 9 | 2011 |
Facilitative and rememberative: novel incentive structures for increased exercise in interactive media V Garg, EK Adams, N Husted, J Brown ACM SIGCAS Computers and Society 44 (2), 11-15, 2014 | 1 | 2014 |
Analysis techniques for exploring emergent vulnerabilities and attacks on mobile devices NW Husted Indiana University, 2014 | 1 | 2014 |
Facilitative and rememberative V Garg, EK Adams, N Husted, J Brown | | 2014 |
The Internet and the Physical World N Husted, S Myers, M Dhiman, M Jakobsson, B Gonçalves, M Conover, ... The Death of the Internet, 197-241, 2012 | | 2012 |
Mobile Health Forensics N Husted, E Walton, C Justice, H Wu | | 2008 |
E-Voting System Design Using Unix Systems Theory N Husted | | 2008 |