Voltage Inc. / NEC Laboratories America / IBM / AES / AT&T Labs / Bell Labs / Avaya Labs / Telcordia Technologies / RTFM Inc. / CBC / RSA Laboratories / HP Labs / Microsoft / /
Currency
pence / / /
Event
Business Partnership / /
Facility
Stevens Institute of Technology Dr. Wright / Rutgers University / Georgia Institute of Technology In / Princeton University / Carnegie Mellon University / Stevens Institute of Technology / University of Maryland Dr. Katz / /
IndustryTerm
software engineering / hash tree chain solution / secure systems / cryptographic tools / data-mining applications / overall software / Internet protocols / Internet infrastructure / ad-hoc networks / security systems / possible applications / bayesian networks / life applications / real-life applications / cryptographic algorithms / electronic voting technology / secure routing protocols / trusted computing base / security protocols / scalar product protocol / Internet communication / privacy preserving protocol / smart card protocol / cryptographic protocols / vulnerable algorithms / cryptographic systems / plug-in solution / e-voting / communication server / anti-spam applications / encryption algorithms / signature algorithms / hybrid systems / /
Organization
University of Maryland / Rutgers University / Princeton University / Rice University / Carnegie Mellon University / Portland State University / National Science Foundation / Stevens Institute of Technology / Johns Hopkins University / Georgia Institute of Technology In / Stanford University / /
Person
Rabin / Adam Stubblefield / Shai Halevi / Xavier Boyen / Eric Rescorla / Rebecca Wright / Jonathan Katz / Tom Shrimpton / Dawn Song / Mike Reiter / Steve Bellovin / Hugo Krawczyk / Yan Zong Ding / Adrian Perrig / Ari Juels / Dan Wallach / Constantin Serban / Dan Boneh / /
Position
Secure Fuzzy Extractors Speaker / Electronic Voting Speaker / Distributed Heterogeneous Data Speaker / fuzzy extractor / security model / Report Author / Fuzzy Commitment Speaker / Cryptography Speaker / Threshold Set Intersection Speaker / probabilistic model / Speaker / access control model / Access Control Speaker / Anonymous Communication Speaker / model / Derivation Using Common Pseudorandom Modes Speaker / Bounded Storage Model Speaker / Secure Routing Protocols Speaker / /