• Login
    Search 
    •   SMARTech Home
    • College of Computing (CoC)
    • School of Computer Science (SCS)
    • Search
    •   SMARTech Home
    • College of Computing (CoC)
    • School of Computer Science (SCS)
    • Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Search

    Show Advanced FiltersHide Advanced Filters

    Filters

    Use filters to refine the search results.

    Now showing items 1-9 of 9

    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
    Thumbnail

    Secure Outsourced Garbled Circuit Evaluation for Mobile Devices 

    Carter, Henry; Mood, Benjamin; Traynor, Patrick; Butler, Kevin (Georgia Institute of Technology, 2012)
    Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user’s inputs. While recent research has made the use of this primitive more practical, such solutions generally ...
    Thumbnail

    An Empirical Evaluation of Security Indicators in Mobile Web Browsers 

    Amrutkar, Chaitrali; Traynor, Patrick; van Oorschot, Paul C. (Georgia Institute of Technology, 2011)
    Mobile browsers are increasingly being relied upon to perform security sensitive operations. Like their desktop counterparts, these applications can enable SSL/TLS to provide strong security guarantees for communications ...
    Thumbnail

    Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices 

    Carter, Henry; Lever, Charles; Traynor, Patrick (Georgia Institute of Technology, 2014)
    Garbled circuits offer a powerful primitive for computation on a user’s personal data while keeping that data private. Despite recent improvements, constructing and evaluating circuits of any useful size remains ...
    Thumbnail

    Efficient Oblivious Computation Techniques for Privacy-Preserving Mobile Applications 

    Carter, Henry; Amrutkar, Chaitrali; Dacosta, Italo; Traynor, Patrick (Georgia Institute of Technology, 2011)
    The growth of smartphone capability has led to an explosion of new applications. Many of the most useful apps use context-sensitive data, such as GPS location or social network information. In these cases, users may not ...
    Thumbnail

    Evaluating Bluetooth as a Medium for Botnet Command and Control 

    Jain, Nehil; Lee, Wenke; Sangal, Samrit; Singh, Kapil; Traynor, Patrick (Georgia Institute of Technology, 2009)
    Malware targeting mobile phones is being studied with increasing interest by the research community. While such attention has previously focused on viruses and worms, many of which use near-field communications in order ...
    Thumbnail

    One-Time Cookies: Preventing Session Hijacking Attacks with Stateless Authentication Tokens 

    Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2012-02)
    HTTP cookies are the de facto mechanism for session authentication in web applications. However, their inherent security weaknesses allow attacks against the integrity of web sessions. HTTPS is often recommended to protect ...
    Thumbnail

    Replacing Oblivious Computation with Private Search for Context Sensitive Communications 

    Amrutkar, Chaitrali; Naik, Rishikesh; Dacosta, Italo; Traynor, Patrick (Georgia Institute of Technology, 2010)
    Context aware applications provide users with an increasingly rich set of services. From services such as interactive maps to restaurant guides and social networking tools, the use of information including location, ...
    Thumbnail

    On the Disparity of Display Security in Mobile and Traditional Web Browsers 

    Amrutkar, Chaitrali; Singh, Kapil; Verma, Arunabh; Traynor, Patrick (Georgia Institute of Technology, 2011)
    Mobile web browsers now provide nearly equivalent features when compared to their desktop counterparts. However, smaller screen size and optimized features for constrained hardware make the web experience on mobile browsers ...
    Thumbnail

    One-Time Cookies: Preventing Session Hijacking Attacks with Disposable Credentials 

    Dacosta, Italo; Chakradeo, Saurabh; Ahamad, Mustaque; Traynor, Patrick (Georgia Institute of Technology, 2011)
    Many web applications are vulnerable to session hijacking attacks due to the insecure use of cookies for session management. The most recommended defense against this threat is to completely replace HTTP with HTTPS. ...

    Browse

    All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CommunityDatesAuthorsTitlesSubjectsTypes

    My SMARTech

    Login

    Discover

    Author
    Traynor, Patrick (9)
    Amrutkar, Chaitrali (4)Dacosta, Italo (4)Carter, Henry (3)Ahamad, Mustaque (2)Chakradeo, Saurabh (2)Singh, Kapil (2)Butler, Kevin (1)Jain, Nehil (1)Lee, Wenke (1)... View MoreSubjectInformation security (4)Security (3)Algorithms (2)Desktop web browsers (2)Display-related security (2)Garbled circuits (2)Hash chain (2)Mobile privacy (2)Mobile web browsers (2)Performance (2)... View MoreDate Issued2011 (4)2012 (2)2009 (1)2010 (1)2014 (1)Has File(s)Yes (9)
    facebook instagram twitter youtube
    • My Account
    • Contact us
    • Directory
    • Campus Map
    • Support/Give
    • Library Accessibility
      • About SMARTech
      • SMARTech Terms of Use
    Georgia Tech Library266 4th Street NW, Atlanta, GA 30332
    404.894.4500
    • Emergency Information
    • Legal and Privacy Information
    • Human Trafficking Notice
    • Accessibility
    • Accountability
    • Accreditation
    • Employment
    © 2020 Georgia Institute of Technology