Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Daniel J. Weitzner3Com Founders Senior Research Scientist, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
- Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
- Leilani H. GilpinUC Santa CruzVerified email at ucsc.edu
- David BauAssistant Professor at Northeastern UniversityVerified email at northeastern.edu
- Lalana KagalMassachusetts Institute of TechnologyVerified email at csail.mit.edu
- Matthew GreenJohns Hopkins UniversityVerified email at cs.jhu.edu
- Sunoo ParkMITVerified email at csail.mit.edu
- Susan LandauTufts UniversityVerified email at privacyink.org
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
- Neha NarulaMIT Media LabVerified email at mit.edu
- Daniela MiaoMITVerified email at mit.edu
- James KoppelMITVerified email at mit.edu
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
- Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Yael Tauman KalaiMicrosoft Research, MITVerified email at microsoft.com
- Ari TrachtenbergProfessor of Electrical and Computer Engineering, Boston UniversityVerified email at bu.edu
- Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
- Marc A. ZissmanAssoc Head, Cyber Security and Information Sciences Division, MIT Lincoln LaboratoryVerified email at ll.mit.edu