Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Richard T. Carback IIIIndependent Scientist and ConsultantVerified email at carback.us
D PhatakCSEE Dept. UMBC, Baltimore, MD 21250Verified email at umbc.edu
Jeremy ClarkConcordia UniversityVerified email at concordia.ca
Stefan PopoveniucVerified email at gwu.edu
Aleksander EssexAssociate Professor of Software Engineering, Western University CanadaVerified email at uwo.ca
Poorvi L. VoraDepartment of Computer Science, The George Washingtion UniversityVerified email at email.gwu.edu
Geoffrey L HermanUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Josiah DykstraU.S. Department of DefenseVerified email at acm.org
David McGrewCisco SystemsVerified email at cisco.com
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
David BalensonUSC Information Sciences InstituteVerified email at balenson.com
Travis MayberryUS Naval AcademyVerified email at usna.edu
Farid JavaniUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
Peter A. H. PetersonAssociate Professor, University of Minnesota DuluthVerified email at d.umn.edu
Russell A. FinkSenior Staff, Applied Physics LaboratoryVerified email at jhuapl.edu
Burt Kaliski Jr.VerisignVerified email at alum.mit.edu
Frank John KrautheimAugusta UniversityVerified email at augusta.edu
Peter KruusThe Johns Hopkins Applied Physics LaboratoryVerified email at jhuapl.edu
Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
Follow
Alan T. Sherman
Professor of Computer Science, Dept. of CSEE, University of Maryland, Baltimore County
Verified email at umbc.edu - Homepage