
Patrick Traynor
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c73]Imani N. Sherman, Jasmine Bowers, Keith McNamara Jr., Juan E. Gilbert, Jaime Ruiz, Patrick Traynor:
Are You Going to Answer That? Measuring User Responses to Anti-Robocall Application Indicators. NDSS 2020 - [i9]Luis Vargas, Patrick Emami, Patrick Traynor:
On the Detection of Disinformation Campaign Activity with Network Analysis. CoRR abs/2005.13466 (2020) - [i8]Hadi Abdullah, Kevin Warren, Vincent Bindschaedler, Nicolas Papernot, Patrick Traynor:
SoK: The Faults in our ASRs: An Overview of Attacks against Automatic Speech Recognition and Speaker Identification Systems. CoRR abs/2007.06622 (2020)
2010 – 2019
- 2019
- [j28]Nolen Scaife
, Christian Peeters, Patrick Traynor:
More Cowbell: Lessons Learned in Developing the Skim Reaper. IEEE Secur. Priv. 17(4): 10-17 (2019) - [j27]Grant Hernandez, Farhaan Fowze
, Dave Jing Tang, Tuba Yavuz, Patrick Traynor, Kevin R. B. Butler:
Toward Automated Firmware Analysis in the IoT Era. IEEE Secur. Priv. 17(5): 38-46 (2019) - [j26]Henry Carter
, Patrick Traynor:
Outsourcing computation for private function evaluation. Int. J. Inf. Comput. Secur. 11(6): 525-561 (2019) - [j25]Bradley Reaves, Luis Vargas, Nolen Scaife
, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Characterizing the Security of the SMS Ecosystem with Public Gateways. ACM Trans. Priv. Secur. 22(1): 2:1-2:31 (2019) - [c72]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation using SGX. AsiaCCS 2019: 100-113 - [c71]Vanessa Frost, Dave (Jing) Tian, Christie Ruales, Vijay Prakash, Patrick Traynor, Kevin R. B. Butler:
Examining DES-based Cipher Suite Support within the TLS Ecosystem. AsiaCCS 2019: 539-546 - [c70]Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
A Practical Intel SGX Setting for Linux Containers in the Cloud. CODASPY 2019: 255-266 - [c69]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. NDSS 2019 - [c68]Luis Vargas, Logan Blue, Vanessa Frost, Christopher Patton, Nolen Scaife, Kevin R. B. Butler, Patrick Traynor:
Digital Healthcare-Associated Infection: A Case Study on the Security of a Major Multi-Campus Hospital System. NDSS 2019 - [c67]Nolen Scaife
, Jasmine Bowers, Christian Peeters, Grant Hernandez, Imani N. Sherman, Patrick Traynor, Lisa Anthony:
Kiss from a Rogue: Evaluating Detectability of Pay-at-the-Pump Card Skimmers. IEEE Symposium on Security and Privacy 2019: 1000-1014 - [c66]Jasmine Bowers, Imani N. Sherman, Kevin R. B. Butler, Patrick Traynor:
Characterizing security and privacy practices in emerging digital credit applications. WiSec 2019: 94-107 - [c65]Joseph I. Choi, Dave (Jing) Tian, Tyler Ward, Kevin R. B. Butler, Patrick Traynor, John M. Shea, Tan F. Wong:
Enclave-based privacy-preserving localization: poster. WiSec 2019: 312-313 - [e4]Nadia Heninger, Patrick Traynor:
28th USENIX Security Symposium, USENIX Security 2019, Santa Clara, CA, USA, August 14-16, 2019. USENIX Association 2019 [contents] - [i7]Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson:
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems. CoRR abs/1904.05734 (2019) - [i6]Joseph I. Choi, Dave (Jing) Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor:
A Hybrid Approach to Secure Function Evaluation Using SGX. CoRR abs/1905.01233 (2019) - [i5]Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor:
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems. CoRR abs/1910.05262 (2019) - 2018
- [j24]Nolen Scaife
, Henry Carter
, Lyrissa Lidsky
, Rachael L. Jones, Patrick Traynor:
OnionDNS: a seizure-resistant top-level domain. Int. J. Inf. Sec. 17(6): 645-660 (2018) - [c64]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. ACSAC 2018: 222-235 - [c63]Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor:
2MA: Verifying Voice Commands via Two Microphone Authentication. AsiaCCS 2018: 89-100 - [c62]Luis Vargas, Gyan Hazarika, Rachel Culpepper, Kevin R. B. Butler, Thomas Shrimpton, Doug Szajda, Patrick Traynor:
Mitigating Risk while Complying with Data Retention Laws. CCS 2018: 2011-2027 - [c61]Christian Peeters, Hadi Abdullah, Nolen Scaife
, Jasmine Bowers, Patrick Traynor, Bradley Reaves, Kevin R. B. Butler:
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding. IEEE Symposium on Security and Privacy 2018: 567-582 - [c60]Nolen Scaife
, Christian Peeters, Camilo Velez, Hanqing Zhao, Patrick Traynor, David Arnold:
The Cards Aren't Alright: Detecting Counterfeit Gift Cards Using Encoding Jitter. IEEE Symposium on Security and Privacy 2018: 1063-1076 - [c59]Nolen Scaife, Christian Peeters, Patrick Traynor:
Fear the Reaper: Characterization and Fast Detection of Card Skimmers. USENIX Security Symposium 2018: 1-14 - [c58]Dave (Jing) Tian, Grant Hernandez, Joseph I. Choi, Vanessa Frost, Christie Ruales, Patrick Traynor, Hayawardh Vijayakumar, Lee Harrison, Amir Rahmati, Michael Grace, Kevin R. B. Butler:
ATtention Spanned: Comprehensive Vulnerability Analysis of AT Commands Within the Android Ecosystem. USENIX Security Symposium 2018: 273-290 - [c57]Logan Blue, Luis Vargas, Patrick Traynor:
Hello, Is It Me You're Looking For?: Differentiating Between Human and Electronic Speakers for Voice Interface Security. WISEC 2018: 123-133 - [i4]Dominik Wermke, Nicolas Huaman, Yasemin Acar, Bradley Reaves, Patrick Traynor, Sascha Fahl:
A Large Scale Investigation of Obfuscation Use in Google Play. CoRR abs/1801.02742 (2018) - 2017
- [j23]Patrick Traynor, Kevin R. B. Butler, Jasmine Bowers, Bradley Reaves:
FinTechSec: Addressing the Security Challenges of Digital Financial Services. IEEE Secur. Priv. 15(5): 85-89 (2017) - [j22]Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter
, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. Proc. Priv. Enhancing Technol. 2017(1): 170-187 (2017) - [j21]Bradley Reaves, Jasmine Bowers, Nolen Scaife
, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20(3): 11:1-11:31 (2017) - [j20]Chaitrali Amrutkar, Young Seuk Kim, Patrick Traynor
:
Detecting Mobile Malicious Webpages in Real Time. IEEE Trans. Mob. Comput. 16(8): 2184-2197 (2017) - [c56]Tyler Ward, Joseph I. Choi, Kevin R. B. Butler, John M. Shea, Patrick Traynor, Tan F. Wong:
Privacy preserving localization using a distributed particle filtering protocol. MILCOM 2017: 835-840 - [c55]Jasmine Bowers, Bradley Reaves, Imani N. Sherman, Patrick Traynor, Kevin R. B. Butler:
Regulators, Mount Up! Analysis of Privacy Policies for Mobile Money Services. SOUPS 2017: 97-114 - [c54]Bradley Reaves, Logan Blue, Hadi Abdullah, Luis Vargas, Patrick Traynor, Thomas Shrimpton:
AuthentiCall: Efficient Identity and Content Authentication for Phone Calls. USENIX Security Symposium 2017: 575-592 - 2016
- [j19]Bradley Reaves, Jasmine Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife
, Byron Wright, Kevin R. B. Butler, William Enck, Patrick Traynor:
*droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Comput. Surv. 49(3): 55:1-55:30 (2016) - [j18]Henry Carter
, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure outsourced garbled circuit evaluation for mobile devices. J. Comput. Secur. 24(2): 137-180 (2016) - [j17]Henry Carter
, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing secure two-party computation as a black box. Secur. Commun. Networks 9(14): 2261-2275 (2016) - [c53]Siddhant Deshmukh, Henry Carter
, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler:
Efficient and secure template blinding for biometric authentication. CNS 2016: 480-488 - [c52]Benjamin Mood, Debayan Gupta, Henry Carter
, Kevin R. B. Butler, Patrick Traynor:
Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation. EuroS&P 2016: 112-127 - [c51]Debayan Gupta, Benjamin Mood, Joan Feigenbaum, Kevin R. B. Butler, Patrick Traynor:
Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation. Financial Cryptography Workshops 2016: 302-318 - [c50]Nolen Scaife
, Henry Carter
, Patrick Traynor, Kevin R. B. Butler:
CryptoLock (and Drop It): Stopping Ransomware Attacks on User Data. ICDCS 2016: 303-312 - [c49]Bradley Reaves, Nolen Scaife
, Dave Tian, Logan Blue, Patrick Traynor, Kevin R. B. Butler:
Sending Out an SMS: Characterizing the Security of the SMS Ecosystem with Public Gateways. IEEE Symposium on Security and Privacy 2016: 339-356 - [c48]Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. USENIX Security Symposium 2016: 415-430 - [c47]Bradley Reaves, Logan Blue, Patrick Traynor:
AuthLoop: End-to-End Cryptographic Authentication for Telephony over Voice Channels. USENIX Security Symposium 2016: 963-978 - [c46]Bradley Reaves, Logan Blue, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
Detecting SMS Spam in the Age of Legitimate Bulk Messaging. WISEC 2016: 165-170 - [e3]Natalie Silvanovich, Patrick Traynor:
10th USENIX Workshop on Offensive Technologies, WOOT 16, Austin, TX, USA, August 8-9, 2016. USENIX Association 2016 [contents] - [i3]Henry Carter, Patrick Traynor:
OPFE: Outsourcing Computation for Private Function Evaluation. IACR Cryptol. ePrint Arch. 2016: 67 (2016) - 2015
- [j16]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [j15]Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot
:
An Empirical Evaluation of Security Indicators in Mobile Web Browsers. IEEE Trans. Mob. Comput. 14(5): 889-903 (2015) - [c45]David Dewey, Bradley Reaves, Patrick Traynor:
Uncovering Use-After-Free Conditions in Compiled Code. ARES 2015: 90-99 - [c44]Henry Carter
, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. CANS 2015: 214-222 - [c43]Nolen Scaife, Henry Carter
, Patrick Traynor:
OnionDNS: A seizure-resistant top-level Domain. CNS 2015: 379-387 - [c42]Ethan Shernan, Henry Carter
, Dave Tian, Patrick Traynor, Kevin R. B. Butler:
More Guidelines Than Rules: CSRF Vulnerabilities from Noncompliant OAuth 2.0 Implementations. DIMVA 2015: 239-260 - [c41]Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. USENIX Security Symposium 2015: 17-32 - [c40]Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor:
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. USENIX Security Symposium 2015: 833-848 - 2014
- [j14]Henry Carter
, Chaitrali Amrutkar, Italo Dacosta, Patrick Traynor:
For your phone only: custom protocols for efficient secure function evaluation on mobile devices. Secur. Commun. Networks 7(7): 1165-1176 (2014) - [c39]Henry Carter
, Charles Lever, Patrick Traynor:
Whitewash: outsourcing garbled circuit generation for mobile devices. ACSAC 2014: 266-275 - [e2]Gergely Ács, Andrew P. Martin, Ivan Martinovic, Claude Castelluccia, Patrick Traynor:
7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WiSec'14, Oxford, United Kingdom, July 23-25, 2014. ACM 2014, ISBN 978-1-4503-2972-9 [contents] - [i2]Henry Carter, Charles Lever, Patrick Traynor:
Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices. IACR Cryptol. ePrint Arch. 2014: 224 (2014) - [i1]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Outsourcing Secure Two-Party Computation as a Black Box. IACR Cryptol. ePrint Arch. 2014: 936 (2014) - 2013
- [c38]Chaitrali Amrutkar, Matti A. Hiltunen, Trevor Jim, Kaustubh R. Joshi, Oliver Spatscheck, Patrick Traynor, Shobha Venkataraman:
Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet. DSN 2013: 1-8 - [c37]Charles Lever, Manos Antonakakis, Bradley Reaves, Patrick Traynor, Wenke Lee:
The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers. NDSS 2013 - [c36]Henry Carter, Benjamin Mood, Patrick Traynor, Kevin R. B. Butler:
Secure Outsourced Garbled Circuit Evaluation for Mobile Devices. USENIX Security Symposium 2013: 289-304 - [c35]Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck:
MAST: triage for market-scale mobile malware analysis. WISEC 2013: 13-24 - 2012
- [j13]Cong Shi, Xiapu Luo
, Patrick Traynor, Mostafa H. Ammar, Ellen W. Zegura:
ARDEN: Anonymous networking in delay tolerant networks. Ad Hoc Networks 10(6): 918-930 (2012) - [j12]Patrick Traynor:
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. IEEE Trans. Mob. Comput. 11(6): 983-994 (2012) - [j11]Italo Dacosta, Saurabh Chakradeo, Mustaque Ahamad, Patrick Traynor:
One-time cookies: Preventing session hijacking attacks with stateless authentication tokens. ACM Trans. Internet Techn. 12(1): 1:1-1:24 (2012) - [c34]Chaitrali Amrutkar, Patrick Traynor:
Short paper: rethinking permissions for mobile web apps: barriers and the road ahead. SPSM@CCS 2012: 15-20 - [c33]Italo Dacosta, Mustaque Ahamad, Patrick Traynor:
Trust No One Else: Detecting MITM Attacks against SSL/TLS without Third-Parties. ESORICS 2012: 199-216 - [c32]Chaitrali Amrutkar, Kapil Singh, Arunabh Verma, Patrick Traynor:
VulnerableMe: Measuring Systemic Weaknesses in Mobile Browser Security. ICISS 2012: 16-34 - [c31]Chaitrali Amrutkar, Patrick Traynor, Paul C. van Oorschot
:
Measuring SSL Indicators on Mobile Browsers: Extended Life, or End of the Road? ISC 2012: 86-103 - [c30]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012 - [c29]Nigel Lawrence, Patrick Traynor:
Under New Management: Practical Attacks on SNMPv3. WOOT 2012 - [e1]Patrick Traynor:
7th USENIX Workshop on Hot Topics in Security, HotSec'12, Bellevue, WA, USA, August 7, 2012. USENIX Association 2012 [contents] - 2011
- [j10]Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas F. La Porta:
From mobile phones to responsible devices. Secur. Commun. Networks 4(6): 719-726 (2011) - [j9]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor:
Improving Authentication Performance of Distributed SIP Proxies. IEEE Trans. Parallel Distributed Syst. 22(11): 1804-1812 (2011) - [c28]Nilesh Nipane, Italo Dacosta, Patrick Traynor:
"Mix-in-Place" anonymous networking using secure function evaluation. ACSAC 2011: 63-72 - [c27]Yacin Nadji, Jonathon T. Giffin, Patrick Traynor:
Automated remote repair for mobile malware. ACSAC 2011: 413-422 - [c26]Philip Marquardt, Arunabh Verma, Henry Carter
, Patrick Traynor:
(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers. CCS 2011: 551-562 - [c25]Philip Marquardt, David Dagon, Patrick Traynor:
Impeding Individual User Profiling in Shopper Loyalty Programs. Financial Cryptography 2011: 93-101 - [c24]David Dewey, Patrick Traynor:
No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects. NDSS 2011 - 2010
- [j8]Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. J. Comput. Secur. 18(5): 799-837 (2010) - [j7]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel, Kevin Borders:
malnets: large-scale malicious networks via compromised wireless access points. Secur. Commun. Networks 3(2-3): 102-113 (2010) - [c23]Vijay A. Balasubramaniyan, Aamir Poonawalla, Mustaque Ahamad, Michael T. Hunter, Patrick Traynor:
PinDr0p: using single-ended audio features to determine call provenance. CCS 2010: 109-120 - [c22]Kapil Singh, Samrit Sangal, Nehil Jain, Patrick Traynor, Wenke Lee:
Evaluating Bluetooth as a Medium for Botnet Command and Control. DIMVA 2010: 61-80 - [c21]Patrick Traynor, Joshua Schiffman, Thomas F. La Porta, Patrick D. McDaniel, Abhrajit Ghosh:
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware. GLOBECOM 2010: 1-6 - [c20]Patrick Traynor:
Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services. SecureComm 2010: 125-143 - [c19]Italo Dacosta, Patrick Traynor:
Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks. USENIX Annual Technical Conference 2010
2000 – 2009
- 2009
- [j6]Patrick Traynor:
Securing Cellular Infrastructure: Challenges and Opportunities. IEEE Secur. Priv. 7(4): 77-79 (2009) - [j5]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas F. La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 17(1): 40-53 (2009) - [j4]Kevin R. B. Butler, Sunam Ryu, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Trans. Parallel Distributed Syst. 20(12): 1803-1815 (2009) - [c18]Frank S. Park, Chinmay Gangakhedkar, Patrick Traynor:
Leveraging Cellular Infrastructure to Improve Fraud Prevention. ACSAC 2009: 350-359 - [c17]Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick D. McDaniel, Thomas F. La Porta:
On cellular botnets: measuring the impact of malicious devices on a cellular network core. CCS 2009: 223-234 - [c16]Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick Traynor, Jonathon T. Giffin:
Robust signatures for kernel data structures. CCS 2009: 566-577 - [c15]Italo Dacosta, Vijay Balasubramaniyan, Mustaque Ahamad, Patrick Traynor:
Improving authentication performance of distributed SIP proxies. IPTComm 2009: 1 - 2008
- [b1]Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta:
Security for Telecommunications Networks. Advances in Information Security 40, Springer 2008, ISBN 978-0-387-72441-6, pp. 1-162 - [j3]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas F. La Porta:
Exploiting open functionality in SMS-capable cellular networks. J. Comput. Secur. 16(6): 713-742 (2008) - [j2]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:
Noninvasive Methods for Host Certification. ACM Trans. Inf. Syst. Secur. 11(3): 16:1-16:23 (2008) - [c14]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel:
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. NDSS 2008 - [c13]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick D. McDaniel:
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008 - 2007
- [j1]Patrick Traynor, Raju Kumar, Heesook Choi, Guohong Cao, Sencun Zhu, Thomas F. La Porta:
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. IEEE Trans. Mob. Comput. 6(6): 663-677 (2007) - [c12]Sunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick D. McDaniel:
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems. AINA Workshops (1) 2007: 519-524 - 2006
- [c11]Song Wang, Richard M. Reichley, Laura A. Noirot, Patricia Storey, Patrick Traynor, W. Claiborne Dunagan, Thomas C. Bailey:
Identification of Patients with Coronary Heart Disease: Meeting Regulatory Standards vs. Improving Overall Care. AMIA 2006 - [c10]Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Brent Waters:
Secure attribute-based systems. CCS 2006: 99-112 - [c9]Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55 - [c8]Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel:
Privacy Preserving Web-Based Email. ICISS 2006: 116-131 - [c7]Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, Tom La Porta:
Establishing Pair-Wise Keys in Heterogeneous Sensor Networks. INFOCOM 2006 - [c6]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas F. La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. MobiCom 2006: 182-193 - [c5]Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guohong Cao, Thomas F. La Porta:
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks. MobiSys 2006: 15-27 - [c4]Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel:
Non-Invasive Methods for Host Certification. SecureComm 2006: 1-10 - [c3]Patrick Traynor, Jaesheung Shin, Bharat B. Madan, Shashi Phoha, Thomas F. La Porta:
Efficient Group Mobility for Heterogeneous Sensor Networks. VTC Fall 2006: 1-5 - [c2]Patrick Traynor, Guohong Cao, Tom La Porta:
The effects of probabilistic key management on secure routing in sensor networks. WCNC 2006: 659-664 - 2005
- [c1]William Enck, Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta:
Exploiting open functionality in SMS-capable cellular networks. CCS 2005: 393-404