-
Chantal David
number theory, analytic number theory, Riemann hypothesis
-
Jeremy Clark
cryptography, blockchain, cryptocurrency
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Ayda Basyouni
software quality and best practices, information systems security, networks
top associated keywords A-Z
- cryptographic protocols6
- information systems security12
- data security7
- network security12
- networks27
- blockchain2
- cryptocurrency4
- cybersecurity16
- FinTech3
- privacy10
- usable security3
- wireless networks19
- algebraic number theory3
- analytic number theory2
- anonymity modeling1
- anti-surveillance tools2
- bitcoin1
- Boolean functions1
- botnet defence4
- CDMA20001
- cloud computing17
- coding theory1
- Cohen-Lenstra heuristics2
- complex dynamic systems19
- copyright9
- critical design6
- cross-layer design2
- cryptographic algorithms1
- cyberforensics5
- cyberphysical systems12
- data hiding/embedding1
- deanonymization1
- democratic values23
- detection of vulnerabilities3
- distribution of prime numbers1
- e-commerce10
- elliptic curves3
- embedded systems8
- FH-CDMA sequence design1
- financial markets14
- functions fields1
- human-computer interaction (HCI)21
- ICT29
- information technologies25
- intra-flow interference1
- L-functions3
- Lang-Trotter conjecture1
- market microstructures4
- mobile ad hoc networks11
- moments (mathematics)1
- network resource allocation3