Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Aaron JohnsonU.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
- Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Micah SherrCallahan Family Professor of Computer Science, Georgetown UniversityVerified email at cs.georgetown.edu
- John GeddesUniversity of MinnesotaVerified email at cs.umn.edu
- Ryan WailsGeorgetown Univeristy, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
- Matthew TraudtNaval Research LaboratoryVerified email at nrl.navy.mil
- Bryan FordEPFLVerified email at epfl.ch
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
- Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Roger DingledineThe Tor ProjectVerified email at freehaven.net
- Claudia DiazKU LeuvenVerified email at esat.kuleuven.be
- Rafa Gálvez VizcaínoKU LeuvenVerified email at kuleuven.be
- Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
- Marc JuarezAssistant Professor, School of Informatics - University of EdinburghVerified email at ed.ac.uk
- Mainak GhoshYale UniversityVerified email at aya.yale.edu
- Miles RichardsonYaleVerified email at yale.edu
- Kevin BauerMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Robert BeverlyProfessor of Computer Science, San Diego State UniversityVerified email at sdsu.edu
- Eugene VassermanKansas State UniversityVerified email at ksu.edu
Follow
Rob Jansen
Computer Security Research Scientist, U.S. Naval Research Laboratory
Verified email at nrl.navy.mil - Homepage