|
|
|
Security
Cryptography
Data
Hiding System
and Software Security Privacy, Policies and General
Security
Ross
Anderson, University of Cambridge
Cambridge, England
www.cl.cam.ac.uk/~rja14
Annie I. Antón, North Carolina State University
Raleigh, North Carolina
www.csc.ncsu.edu/faculty/anton
Jan Camenisch, IBM Research
Zürich, Switzerland
www.zurich.ibm.com/~jca
Dorothy Denning, Naval Postgraduate School
Monterey, California
www.nps.navy.mil/ctiw/staff/denning.html
Joan Feigenbaum, Yale
New Haven, Connecticut
www.cs.yale.edu/homes/jf/home.html
Anita Jones, University of Virginia
Charlottesville, Virginia
www.cs.virginia.edu/~jones
Peter G. Neumann, SRI International
Menlo Park, California
www.csl.sri.com/users/neumann
Andrew Odlyzko, University of Minnesota
Minneapolis/St. Paul, Minnesota
www.dtc.umn.edu/~odlyzko
Ronald L. Rivest, Massachusetts Institute of Technology
Cambridge, Massachusetts
theory.lcs.mit.edu/~rivest
Aviel D. Rubin, Johns Hopkins University
Baltimore, Maryland
www.cs.jhu.edu/~rubin
Eugene H. Spafford, Purdue Unversity
West Lafayette, Indiana
www.cerias.purdue.edu/homes/spaf
Doug Tygar, University of California, Berkeley
Berkeley, California
www.cs.berkeley.edu/~tygar
|
|
|
© Copyright Technology Research News, LLC 2000-2005. All rights
reserved.
|
|
|
|