Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
John LangfordMicrosoft Research New YorkVerified email at hunch.net
Eugene VassermanKansas State UniversityVerified email at ksu.edu
Eric Chan-TinAssociate Professor of Computer Science, Loyola University ChicagoVerified email at cs.luc.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Max SchuchardAssistant Professor, University of TennesseeVerified email at utk.edu
Denis Foo KuneAmazon Web ServicesVerified email at amazon.com
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
John GeddesUniversity of MinnesotaVerified email at cs.umn.edu
Nicholas Freitag McPheeUniversity of Minnesota, MorrisVerified email at morris.umn.edu
Shuai LiUniversity of Colorado, Colorado SpringsVerified email at uccs.edu
Zi LinUniversity of MinnesotaVerified email at cs.umn.edu
Christopher ThompsonGoogleVerified email at google.com
Victor HeorhiadiAWSVerified email at victorh.net
Jung Hee CheonProfessor of Department of Mathematical Sciences, Seoul National UniversityVerified email at snu.ac.kr
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Roger DingledineThe Tor ProjectVerified email at freehaven.net
Andrew BortzStanford UniversityVerified email at cs.stanford.edu
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Mohammad Saidur RahmanPh.D. Candidate, ESL Global Cybersecurity Institute at Rochester Institute of TechnologyVerified email at mail.rit.edu
Follow
Nicholas Hopper
Professor of Computer Science & Engineering, University of Minnesota
Verified email at umn.edu - Homepage