Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
David MolnarVerified email at microsoft.com
Michael J. FreedmanRobert E. Kahn Professor of Computer Science, Princeton UniversityVerified email at cs.princeton.edu
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Alessandro AcquistiCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Kevin BauerMIT Lincoln LaboratoryVerified email at ll.mit.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Karsten LoesingThe Tor ProjectVerified email at torproject.org
Nathan S. EvansAssociate Teaching Professor/Faculty Directory Cybersecurity, University of DenverVerified email at du.edu
Christian GrothoffBern University of Applied SciencesVerified email at grothoff.org
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Jonathan EllithorpePhD, Stanford UniversityVerified email at cs.stanford.edu
Emily StarkGoogleVerified email at google.com
George KadianakisVerified email at riseup.net
Justin SamuelUniversity of California, BerkeleyVerified email at cs.berkeley.edu
Justin CapposProfessor of Computer Science and Engineering, NYUVerified email at nyu.edu
Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk