Carl A. Gunter

Affiliations: 
University of Pennsylvania, Philadelphia, PA, United States 
Area:
Computer Science, Mathematics
Google:
"Carl Gunter"

Parents

Sign in to add mentor
Kenneth Kunen grad student 1985 UW Madison
 (Profinite Solutions for Recursive Domain Equations)
Dana Stewart Scott grad student 1985 UW Madison (Philosophy Tree)

Children

Sign in to add trainee
Davor Obradovic grad student 2001 Penn
Karthikeyan Bhargavan grad student 2003 Penn
Alwyn E. Goodloe grad student 2008 Penn
Michael J. May grad student 2008 Penn (E-Tree)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Kotz D, Gunter CA, Kumar S, et al. (2016) Privacy and Security in Mobile Health: A Research Agenda. Computer. 49: 22-30
Kotz D, Fu K, Gunter C, et al. (2015) Security for mobile and cloud frontiers in healthcare Communications of the Acm. 58: 21-23
LeMay M, Gunter CA. (2015) Network-on-chip firewall: Countering defective and malicious system-on-chip hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9200: 404-426
LeMay M, Gunter CA. (2012) Cumulative Attestation Kernels for Embedded Systems Ieee Transactions On Smart Grid. 3: 744-760
Khanna S, Venkatesh SS, Fatemieh O, et al. (2012) Adaptive selective verification: an efficient adaptive countermeasure to thwart DoS attacks Ieee Acm Transactions On Networking. 20: 715-728
Zhang J, Gunter CA. (2011) Application-aware secure multicast for power grid communications International Journal of Security and Networks. 6: 40-52
Uddin MYS, Khurshid A, Jung HD, et al. (2011) Making DTNs robust against spoofing attacks with localized countermeasures 2011 8th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2011. 332-340
Bobba R, Fatemieh O, Khan F, et al. (2010) Attribute-Based Messaging: Access control and confidentiality Acm Transactions On Information and System Security. 13
Goodloe AE, Gunter CA. (2009) Completeness of discovery protocols Proceedings of the Acm Conference On Computer and Communications Security. 29-36
Anderson P, Gunter C, Kalmanek C, et al. (2009) Network infrastructure configuration Ieee Journal On Selected Areas in Communications. 27: 249-252
See more...