Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Peter MellNational Institute of Standards and TechnologyVerified email at nist.gov
- Joseph FalcoNational Instiute of Standards and TechnologyVerified email at nist.gov
- Vincent C. HuNISTVerified email at nist.gov
- Sasha RomanoskyRAND CorporationVerified email at rand.org
- David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
- D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov
- Angela OrebaughUniversity of VirginiaVerified email at Virginia.EDU
- Paul E. BlackNISTVerified email at nist.gov
- Jeffrey VoasComputer Scientist, NISTVerified email at ieee.org
- Neal ZiringTechnical Director, Cybersecurity Directorate, National Security AgencyVerified email at nsa.gov
- Elizabeth LeMayVerified email at lemays.org
- Tatu YlonenUniversity of Helsinki, Clausal ComputingVerified email at ylonen.org
- R. ChandramouliStevens Institute of TechnologyVerified email at ieee.org
- Hildegard FerraioloComputer Scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov