Who to Watch Cryptography

Mihir Bellare, University of California, San Diego
La Jolla, California
charlotte.ucsd.edu/users/mihir

Dan Boneh, Stanford University
Stanford, California
theory.stanford.edu/~dabo

Peter Gutmann, University of Auckland
Auckland, New Zealand
www.cs.auckland.ac.nz/~pgut001/

Ueli Maurer, ETH Zürich
Zürich, Switzerland
www.crypto.ethz.ch/~maurer

Christof Paar, Ruhr-University Bochum
Bochum, Germany
www.crypto.ruhr-uni-bochum.de/MitarbeiterInnen/paar_eng.html

Adi Shamir, The Weizmann Institute of Science Rehovot, Israel
www.wisdom.weizmann.ac.il/~oded/wis-cry.html

Data Hiding

Charles Boncelet, University of Delaware
Newark, Delaware
www.eecis.udel.edu/~boncelet

Jana Dittmann, Otto-von-Guericke-University
Magdeburg, Germany
www.darmstadt.gmd.de/~dittmann

Jessica Fridrich, Binghamton University
Binghamton, New York
www.ws.binghamton.edu/fridrich/fridrich.html

Neil F. Johnson, George Mason University
Fairfax, Virginia
www.jjtc.com/neil/research.html

Stefan Katzenbeisser, Technical University of Munich
Munich, Germany
wwwbrauer.in.tum.de/~katzenbe

Bede Liu, Princeton University
Princeton, New Jersey
www.ee.princeton.edu/bios/liubio.html

System and Software Security

Matt Bishop, University of California, Davis
Davis, California
nob.cs.ucdavis.edu/~bishop

Edward W. Felten, Princeton University
Princeton, New Jersey
www.cs.princeton.edu/~felten

Sushil Jajodia, George Mason University
Fairfax, Virginia
www.ise.gmu.edu/~csis/faculty/jajodia.html

Karl N. Levitt, University of California, Davis
Davis, California
seclab.cs.ucdavis.edu

R. Sekar, SUNY Stony Brook
Stony Brook, New York
seclab.cs.sunysb.edu/sekar

David Wagner, University of California, Berkeley
Berkeley, California
www.cs.berkeley.edu/~daw

Dan Wallach, Rice University
Houston, Texas
www.cs.rice.edu/~dwallach

Privacy, Policies and General Security

Ross Anderson, University of Cambridge
Cambridge, England
www.cl.cam.ac.uk/~rja14

Annie I. Antón, North Carolina State University
Raleigh, North Carolina
www.csc.ncsu.edu/faculty/anton

Jan Camenisch, IBM Research
Zürich, Switzerland
www.zurich.ibm.com/~jca

Dorothy Denning, Naval Postgraduate School
Monterey, California
www.nps.navy.mil/ctiw/staff/denning.html

Joan Feigenbaum, Yale
New Haven, Connecticut
www.cs.yale.edu/homes/jf/home.html

Anita Jones, University of Virginia
Charlottesville, Virginia
www.cs.virginia.edu/~jones

Peter G. Neumann, SRI International
Menlo Park, California
www.csl.sri.com/users/neumann

Andrew Odlyzko, University of Minnesota
Minneapolis/St. Paul, Minnesota
www.dtc.umn.edu/~odlyzko

Ronald L. Rivest, Massachusetts Institute of Technology
Cambridge, Massachusetts
theory.lcs.mit.edu/~rivest

Aviel D. Rubin, Johns Hopkins University
Baltimore, Maryland
www.cs.jhu.edu/~rubin

Eugene H. Spafford, Purdue Unversity
West Lafayette, Indiana
www.cerias.purdue.edu/homes/spaf

Doug Tygar, University of California, Berkeley
Berkeley, California
www.cs.berkeley.edu/~tygar

What to Look For

Cryptography:

Biometric encryption key generation
Public keys email addresses
DNA code cracking computer
Large-scale quantum computer

Quantum cryptography:

Quantum repeaters
High-bandwidth quantum cryptography
Satellite-based quantum cryptography

Data hiding:

Practical print-based data hiding
Practical text-based data hiding
Efficient hidden data detection and decryption

Systems and software:

Self-healing operating systems
Self-healing database systems
Practical anomaly-based intruder detection

Internet:

Practical Internet immunization scheme
Internet immune system
Internet hub protection

Privacy protection:

Of the good for the from the method Widely deployed Anonymous Web access software
Censor-proof Web publishing

Physical security:

Copy-proof unique physical tokens
Wireless automatic personal authentication
Attention-based automatic camera and sensor targeting
Reliable automatic forgery detection