Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Richard ChowIntelVerified email at intel.com
Dirk BalfanzGoogleVerified email at google.com
Sara Miner MoreAssociate Teaching Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu
Markus JakobssonFounder/CTO, ZapFraud; Chief Scientist, Artema LABSVerified email at zapfraud-inc.com
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
Burt Kaliski Jr.VerisignVerified email at alum.mit.edu
Jesus MolinaIndependent Consultant, Jesus Molina ConsultingVerified email at jesusmolina.com
David WoodruffProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Matt FranklinProfessor of Computer Science, U. C. DavisVerified email at cs.ucdavis.edu
Rob JohnsonVMware ResearchVerified email at vmware.com
Teresa LuntPARCVerified email at parc.com
Avishai WoolProfessor of Computer Engineering, Tel Aviv UniversityVerified email at eng.tau.ac.il
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
David A. HuffakerGoogle, Inc.Verified email at google.com
Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Ruizhong WeiProfessor, Lakehead UniversityVerified email at lakeheadu.ca
Diana K. SmettersGoogleVerified email at google.com
Tracy Holloway KingAdobe Inc., Search Discovery and Content AIVerified email at alum.mit.edu