Get my own profile
Public access
View all37 articles
10 articles
available
not available
Based on funding mandates
Co-authors
Yu LeiUniversity of Texas at ArlingtonVerified email at cse.uta.edu
David FerraioloManager, Secure Systems & Applications Group, NIST Verified email at nist.gov
Vincent C. HuNISTVerified email at nist.gov
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Ramaswamy ChandramouliSupervisory Computer Scientist, Computer Security Division, Information Technology Lab, NISTVerified email at nist.gov
Jeffrey VoasComputer Scientist, NISTVerified email at ieee.org
Linbin YuFacebookVerified email at mavs.uta.edu
Laleh GhandehariUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Timothy WeilEditor - IEEE IT Professional magazineVerified email at securityfeeds.com
Thomas J. WalshSony AIVerified email at sony.com
Doug MontgomeryManager, Internet and Scalable Systems Research, NISTVerified email at nist.gov
Tao XieUniversity Chair Professor, School of Computer Science, Peking UniversityVerified email at pku.edu.cn
Feng DuanUniversity of Texas at ArlingtonVerified email at mavs.uta.edu
Dr. Kotikalapudi SriramNational Institute of Standards and TechnologyVerified email at nist.gov
Renee BryceUniversity of North TexasVerified email at unt.edu
Mehra N. BorazjanyPh.D Computer Science, University of Texas at ArlingtonVerified email at mavs.uta.edu
Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
Constantinos KoliasUniversity of IdahoVerified email at uidaho.edu
Paul E. BlackNISTVerified email at nist.gov
Jacek CzerwonkaMicrosoft Corp.Verified email at microsoft.com
Follow
D. Richard (Rick) Kuhn
Computer scientist, National Institute of Standards and Technology (NIST)
Verified email at nist.gov - Homepage