Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at itd.nrl.navy.mil
Aaron JohnsonU.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Micah SherrAssociate Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
John GeddesUniversity of MinnesotaVerified email at cs.umn.edu
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Bryan FordEPFLVerified email at epfl.ch
Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Roger DingledineThe Tor ProjectVerified email at freehaven.net
Claudia DiazKU LeuvenVerified email at esat.kuleuven.be
Rafa Gálvez VizcaínoKU LeuvenVerified email at kuleuven.be
Marc JuarezUSCVerified email at usc.edu
Eugene VassermanKansas State UniversityVerified email at ksu.edu
Robert BeverlyAssociate Professor, Naval Postgraduate SchoolVerified email at nps.edu
Kevin BauerMIT Lincoln LaboratoryVerified email at ll.mit.edu
Tariq ElahiLecturer (Assistant Professor) in Informatics, University of EdinburghVerified email at ed.ac.uk
Aaron D. JaggardU.S. Naval Research LaboratoryVerified email at dimacs.rutgers.edu
Joan FeigenbaumGrace Murray Hopper Professor of Computer Science, Yale UniversityVerified email at yale.edu
Karsten LoesingThe Tor ProjectVerified email at torproject.org
Matthew K WrightDirector of Research for the Global Cybersecurity Institute at Rochester Institute of TechnologyVerified email at rit.edu
Rob Jansen
Computer Security Research Scientist, U.S. Naval Research Laboratory
Verified email at nrl.navy.mil - Homepage