Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
John LangfordMicrosoft Research New YorkVerified email at hunch.net
Eugene VassermanKansas State UniversityVerified email at ksu.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
Denis Foo KuneAmazon Web ServicesVerified email at amazon.com
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
John GeddesUniversity of MinnesotaVerified email at cs.umn.edu
Nicholas Freitag McPheeUniversity of Minnesota, MorrisVerified email at morris.umn.edu
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Zi LinUniversity of MinnesotaVerified email at cs.umn.edu
Nate MathewsRochester Institute of TechnologyVerified email at mail.rit.edu
Christopher ThompsonGoogleVerified email at google.com
Victor HeorhiadiAWSVerified email at victorh.net
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
Mohammad Saidur RahmanAssistant Professor, University of Texas at El PasoVerified email at utep.edu
Roger DingledineThe Tor ProjectVerified email at freehaven.net
Andrew BortzStanford UniversityVerified email at cs.stanford.edu
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Brent ByungHoon KangGraduate School of Information Security, KAIST (Korea Advanced Institute of Science and Technology)Verified email at kaist.ac.kr
Follow
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Verified email at umn.edu - Homepage