Get my own profile
Co-authors
Karen ScarfonePrincipal Consultant, Scarfone CybersecurityVerified email at scarfonecybersecurity.com
Sasha RomanoskyRAND CorporationVerified email at rand.org
James ShookNational Institute of Standards and TechnologyVerified email at nist.gov
Rich HarangNVIDIAVerified email at nvidia.com
Assane GueyeAssociate Teaching ProfessorVerified email at andrew.cmu.edu
Robert BohnNational Institute of Standards and TechnologyVerified email at nist.gov
Richard LippmannLaboratory Fellow, MIT Lincoln LaboratoryVerified email at ll.mit.edu
Vincent C. HuNISTVerified email at nist.gov
Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.gov
John KelseyNISTVerified email at nist.gov
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov