Carl A. Gunter
Affiliations: | University of Pennsylvania, Philadelphia, PA, United States |
Area:
Computer Science, MathematicsGoogle:
"Carl Gunter"Parents
Sign in to add mentorKenneth Kunen | grad student | 1985 | UW Madison | |
(Profinite Solutions for Recursive Domain Equations) | ||||
Dana Stewart Scott | grad student | 1985 | UW Madison (Philosophy Tree) |
Children
Sign in to add traineeDavor Obradovic | grad student | 2001 | Penn |
Karthikeyan Bhargavan | grad student | 2003 | Penn |
Alwyn E. Goodloe | grad student | 2008 | Penn |
Michael J. May | grad student | 2008 | Penn (E-Tree) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Kotz D, Gunter CA, Kumar S, et al. (2016) Privacy and Security in Mobile Health: A Research Agenda. Computer. 49: 22-30 |
Kotz D, Fu K, Gunter C, et al. (2015) Security for mobile and cloud frontiers in healthcare Communications of the Acm. 58: 21-23 |
LeMay M, Gunter CA. (2015) Network-on-chip firewall: Countering defective and malicious system-on-chip hardware Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9200: 404-426 |
LeMay M, Gunter CA. (2012) Cumulative Attestation Kernels for Embedded Systems Ieee Transactions On Smart Grid. 3: 744-760 |
Khanna S, Venkatesh SS, Fatemieh O, et al. (2012) Adaptive selective verification: an efficient adaptive countermeasure to thwart DoS attacks Ieee Acm Transactions On Networking. 20: 715-728 |
Zhang J, Gunter CA. (2011) Application-aware secure multicast for power grid communications International Journal of Security and Networks. 6: 40-52 |
Uddin MYS, Khurshid A, Jung HD, et al. (2011) Making DTNs robust against spoofing attacks with localized countermeasures 2011 8th Annual Ieee Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, Secon 2011. 332-340 |
Bobba R, Fatemieh O, Khan F, et al. (2010) Attribute-Based Messaging: Access control and confidentiality Acm Transactions On Information and System Security. 13 |
Goodloe AE, Gunter CA. (2009) Completeness of discovery protocols Proceedings of the Acm Conference On Computer and Communications Security. 29-36 |
Anderson P, Gunter C, Kalmanek C, et al. (2009) Network infrastructure configuration Ieee Journal On Selected Areas in Communications. 27: 249-252 |