Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aaron JohnsonU.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
John GeddesUniversity of MinnesotaVerified email at cs.umn.edu
Ryan WailsGeorgetown Univeristy, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Matthew TraudtNaval Research LaboratoryVerified email at nrl.navy.mil
Bryan FordEPFLVerified email at epfl.ch
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Roger DingledineThe Tor ProjectVerified email at freehaven.net
Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Claudia DiazKU LeuvenVerified email at esat.kuleuven.be
Rafa Gálvez VizcaínoKU LeuvenVerified email at kuleuven.be
Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Marc JuarezAssistant Professor, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Mainak GhoshYale UniversityVerified email at aya.yale.edu
Miles RichardsonYaleVerified email at yale.edu
Carmela TroncosoEPFLVerified email at epfl.ch
Giovanni CherubinMicrosoftVerified email at microsoft.com
Kevin BauerMIT Lincoln LaboratoryVerified email at ll.mit.edu
Follow
Rob Jansen
Computer Security Research Scientist, U.S. Naval Research Laboratory
Verified email at nrl.navy.mil - Homepage