Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aaron JohnsonU.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.milNicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
Ryan WailsGeorgetown UniveristyVerified email at georgetown.edu
John GeddesUniversity of MinnesotaVerified email at cs.umn.edu
Matthew TraudtNaval Research LaboratoryVerified email at nrl.navy.milBryan FordEPFLVerified email at epfl.ch
Roger DingledineThe Tor ProjectVerified email at freehaven.netAndrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Claudia DiazKU LeuvenVerified email at esat.kuleuven.be
Rafa Gálvez VizcaínoKU LeuvenVerified email at kuleuven.beTariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Marc JuarezAssistant Professor, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Carmela TroncosoEPFL & MPI-SPVerified email at epfl.ch
Giovanni CherubinMicrosoftVerified email at microsoft.com
Kevin BauerMIT Lincoln LaboratoryVerified email at ll.mit.edu
Mainak GhoshYale UniversityVerified email at aya.yale.edu
Miles RichardsonYaleVerified email at yale.edu
Follow
Rob Jansen
Computer Security Research Scientist, U.S. Naval Research Laboratory
Verified email at nrl.navy.mil - Homepage