Who to Watch
Cryptography
Mihir Bellare, University of California, San Diego
La Jolla, California
charlotte.ucsd.edu/users/mihir
Dan Boneh, Stanford University
Stanford, California
theory.stanford.edu/~dabo
Peter Gutmann, University of Auckland
Auckland, New Zealand
www.cs.auckland.ac.nz/~pgut001/
Ueli Maurer, ETH Zürich
Zürich, Switzerland
www.crypto.ethz.ch/~maurer
Christof Paar, Ruhr-University Bochum
Bochum, Germany
www.crypto.ruhr-uni-bochum.de/MitarbeiterInnen/paar_eng.html
Adi Shamir, The Weizmann Institute of Science Rehovot, Israel
www.wisdom.weizmann.ac.il/~oded/wis-cry.html
Data Hiding
Charles Boncelet, University of Delaware
Newark, Delaware
www.eecis.udel.edu/~boncelet
Jana Dittmann, Otto-von-Guericke-University
Magdeburg, Germany
www.darmstadt.gmd.de/~dittmann
Jessica Fridrich, Binghamton University
Binghamton, New York
www.ws.binghamton.edu/fridrich/fridrich.html
Neil F. Johnson, George Mason University
Fairfax, Virginia
www.jjtc.com/neil/research.html
Stefan Katzenbeisser, Technical University of Munich
Munich, Germany
wwwbrauer.in.tum.de/~katzenbe
Bede Liu, Princeton University
Princeton, New Jersey
www.ee.princeton.edu/bios/liubio.html
System and Software Security
Matt Bishop, University of California, Davis
Davis, California
nob.cs.ucdavis.edu/~bishop
Edward W. Felten, Princeton University
Princeton, New Jersey
www.cs.princeton.edu/~felten
Sushil Jajodia, George Mason University
Fairfax, Virginia
www.ise.gmu.edu/~csis/faculty/jajodia.html
Karl N. Levitt, University of California, Davis
Davis, California
seclab.cs.ucdavis.edu
R. Sekar, SUNY Stony Brook
Stony Brook, New York
seclab.cs.sunysb.edu/sekar
David Wagner, University of California, Berkeley
Berkeley, California
www.cs.berkeley.edu/~daw
Dan Wallach, Rice University
Houston, Texas
www.cs.rice.edu/~dwallach
Privacy, Policies and General Security
Ross Anderson, University of Cambridge
Cambridge, England
www.cl.cam.ac.uk/~rja14
Annie I. Antón, North Carolina State University
Raleigh, North Carolina
www.csc.ncsu.edu/faculty/anton
Jan Camenisch, IBM Research
Zürich, Switzerland
www.zurich.ibm.com/~jca
Dorothy Denning, Naval Postgraduate School
Monterey, California
www.nps.navy.mil/ctiw/staff/denning.html
Joan Feigenbaum, Yale
New Haven, Connecticut
www.cs.yale.edu/homes/jf/home.html
Anita Jones, University of Virginia
Charlottesville, Virginia
www.cs.virginia.edu/~jones
Peter G. Neumann, SRI International
Menlo Park, California
www.csl.sri.com/users/neumann
Andrew Odlyzko, University of Minnesota
Minneapolis/St. Paul, Minnesota
www.dtc.umn.edu/~odlyzko
Ronald L. Rivest, Massachusetts Institute of Technology
Cambridge, Massachusetts
theory.lcs.mit.edu/~rivest
Aviel D. Rubin, Johns Hopkins University
Baltimore, Maryland
www.cs.jhu.edu/~rubin
Eugene H. Spafford, Purdue Unversity
West Lafayette, Indiana
www.cerias.purdue.edu/homes/spaf
Doug Tygar, University of California, Berkeley
Berkeley, California
www.cs.berkeley.edu/~tygar
What to Look For
Cryptography:
Biometric encryption
key generation
Public keys email addresses
DNA code cracking computer
Large-scale quantum computer
Quantum cryptography:
Quantum repeaters
High-bandwidth quantum cryptography
Satellite-based quantum cryptography
Data hiding:
Practical print-based data hiding
Practical text-based data hiding
Efficient hidden data detection and decryption
Systems and software:
Self-healing operating systems
Self-healing database systems
Practical anomaly-based intruder detection
Internet:
Practical Internet immunization scheme
Internet immune system
Internet hub protection
Privacy protection:
Of the good for the from the method Widely deployed Anonymous Web access software
Censor-proof Web publishing
Physical security:
Copy-proof unique physical tokens
Wireless automatic personal authentication
Attention-based automatic camera and sensor targeting
Reliable automatic forgery detection