Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
- John LangfordMicrosoft Research New YorkVerified email at hunch.net
- Eugene VassermanKansas State UniversityVerified email at ksu.edu
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
- Denis Foo KuneAmazon Web ServicesVerified email at amazon.com
- David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
- John GeddesUniversity of MinnesotaVerified email at cs.umn.edu
- Nicholas Freitag McPheeUniversity of Minnesota, MorrisVerified email at morris.umn.edu
- Zi LinUniversity of MinnesotaVerified email at cs.umn.edu
- Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
- Christopher ThompsonGoogleVerified email at google.com
- Victor HeorhiadiAWSVerified email at victorh.net
- Nate MathewsRochester Institute of TechnologyVerified email at mail.rit.edu
- Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
- Mohammad Saidur RahmanAssistant Professor, University of Texas at El PasoVerified email at utep.edu
- Roger DingledineThe Tor ProjectVerified email at freehaven.net
- Andrew BortzStanford UniversityVerified email at cs.stanford.edu
- Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Brent ByungHoon KangGraduate School of Information Security, KAIST (Korea Advanced Institute of Science and Technology)Verified email at kaist.ac.kr
Follow
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Verified email at umn.edu - Homepage