What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Carrie Gates
Google Scholar
ORCID:
0009-0000-5629-4755
14
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
A First Look at Governments' Enterprise Security Guidance.
Kimberly Ruth
Raymond Buernor Obu
Ifeoluwa Shode
Gavin Li
Carrie Gates
Grant Ho
Zakir Durumeric
2024
conf/ccs
"Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors.
Kevin Warren
Tyler Tucker
Anna Crowder
Daniel Olszewski
Allison Lu
Caroline Fedele
Magdalena Pasternak
Seth Layton
Kevin R. B. Butler
Carrie Gates
Patrick Traynor
2018
conf/nspw
Augmenting Machine Learning with Argumentation.
Matt Bishop
Carrie Gates
Karl N. Levitt
2014
conf/nspw
Data Is the New Currency.
Carrie Gates
Peter Matthews
2013
conf/nspw
Forgive and forget: return to obscurity.
Matt Bishop
Emily Rine Butler
Kevin R. B. Butler
Carrie Gates
Steven Greenspan
2013
conf/nspw
Information behaving badly.
Julie Boxwell Ard
Matt Bishop
Carrie Gates
Michael Xin Sun
2009
conf/nspw
The sisterhood of the traveling packets.
Matt Bishop
Carrie Gates
Jeffrey Hunker
2009
conf/ndss
Coordinated Scan Detection.
Carrie Gates
2008
conf/ccs
An access control reference architecture.
Amir Jerbi
Ethan Hadar
Carrie Gates
Dmitry Grebenev
2008
conf/nspw
We have met the enemy and he is us.
Matt Bishop
Sophie Engle
Sean Peisert
Sean Whalen
Carrie Gates
2006
conf/nspw
Challenging the anomaly detection paradigm: a provocative discussion.
Carrie Gates
Carol Taylor
2004
conf/nspw
Profiling the defenders.
Carrie Gates
Tara Whalen
2003
conf/nspw
Locality: a new paradigm for thinking about normal behavior and outsider threat.
John McHugh
Carrie Gates
2003
conf/nspw
Owner-controlled information.
Carrie Gates
Jacob Slonim
Coauthors
Allison Lu
(1)
Amir Jerbi
(1)
Anna Crowder
(1)
Carol Taylor
(1)
Caroline Fedele
(1)
Carrie Gates
(14)
Daniel Olszewski
(1)
Dmitry Grebenev
(1)
Emily Rine Butler
(1)
Ethan Hadar
(1)
Gavin Li
(1)
Grant Ho
(1)
Ifeoluwa Shode
(1)
Jacob Slonim
(1)
Jeffrey Hunker
(1)
John McHugh
(1)
Julie Boxwell Ard
(1)
Karl N. Levitt
(1)
Kevin R. B. Butler
(2)
Kevin Warren
(1)
Kimberly Ruth
(1)
Magdalena Pasternak
(1)
Matt Bishop
(5)
Michael Xin Sun
(1)
Patrick Traynor
(1)
Peter Matthews
(1)
Raymond Buernor Obu
(1)
Sean Peisert
(1)
Sean Whalen
(1)
Seth Layton
(1)
Sophie Engle
(1)
Steven Greenspan
(1)
Tara Whalen
(1)
Tyler Tucker
(1)
Zakir Durumeric
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to