Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- David MolnarVerified email at microsoft.com
- Michael J. FreedmanRobert E. Kahn Professor of Computer Science, Princeton UniversityVerified email at cs.princeton.edu
- Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
- George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
- Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Kevin BauerMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
- Karsten LoesingThe Tor ProjectVerified email at torproject.org
- Nathan S. EvansAssociate Teaching Professor/Faculty Directory Cybersecurity, University of DenverVerified email at du.edu
- Christian GrothoffBern University of Applied SciencesVerified email at grothoff.org
- Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
- Jonathan EllithorpePhD, Stanford UniversityVerified email at cs.stanford.edu
- Emily StarkGoogleVerified email at google.com
- Justin SamuelUniversity of California, BerkeleyVerified email at cs.berkeley.edu
- Justin CapposAssociate Professor of Computer Science and Engineering, NYUVerified email at nyu.edu
- Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
- Mashael AlSabahQatar Computing Research InstituteVerified email at hbku.edu.qa