Follow
Nathaniel Husted
Nathaniel Husted
Unknown affiliation
Verified email at indiana.edu
Title
Cited by
Cited by
Year
Mobile location tracking in metro areas: malnets and others
N Husted, S Myers
Proceedings of the 17th ACM conference on Computer and communications …, 2010
792010
GPU and CPU parallelization of honest-but-curious secure two-party computation
N Husted, S Myers, A Shelat, P Grubbs
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
552013
Smartphone security limitations: conflicting traditions
N Husted, H Saïdi, A Gehani
Proceedings of the 2011 Workshop on Governance of Technology, Information …, 2011
512011
Android provenance: diagnosing device disorders
N Husted, S Quresi, A Gehani
5th USENIX Workshop on the Theory and Practice of Provenance (TaPP 13), 2013
182013
Why {Mobile-to-Mobile} Wireless Malware Won't Cause a Storm
N Husted, S Myers
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 11), 2011
172011
Pythia: a privacy aware, peer-to-peer network for social search
S Nilizadeh, N Alam, N Husted, A Kapadia
Proceedings of the 10th annual ACM workshop on Privacy in the electronic …, 2011
132011
Emergent properties & security: The complexity ofsecurity as a science
N Husted, S Myers
Proceedings of the 2014 New Security Paradigms Workshop, 1-14, 2014
102014
The smuggling theory approach to organized digital crime
V Garg, N Husted, J Camp
2011 eCrime Researchers Summit, 1-7, 2011
82011
Facilitative and rememberative: novel incentive structures for increased exercise in interactive media
V Garg, EK Adams, N Husted, J Brown
ACM SIGCAS Computers and Society 44 (2), 11-15, 2014
12014
Analysis techniques for exploring emergent vulnerabilities and attacks on mobile devices
NW Husted
Indiana University, 2014
12014
Facilitative and rememberative
V Garg, EK Adams, N Husted, J Brown
2014
The Internet and the Physical World
N Husted, S Myers, M Dhiman, M Jakobsson, B Gonçalves, M Conover, ...
The Death of the Internet, 197-241, 2012
2012
Mobile Health Forensics
N Husted, E Walton, C Justice, H Wu
2008
E-Voting System Design Using Unix Systems Theory
N Husted
2008
The system can't perform the operation now. Try again later.
Articles 1–14