Link to expertisefinder.com

7 experts in "security protocols" found:

Profile photo of Guang Gong, expert at University of Waterloo

Guang Gong

Expert In:

  • Network security
  • Security protocols
  • Wireless security
  • Big data/analytics
View Profile
Profile photo of Steven Bellovin, expert at Columbia University

Steven Bellovin

Expert In:

  • Computer security
  • Internet security
  • network protocols
  • cryptographic protocols
View Profile
Profile photo of Claude Crepeau, expert at McGill University

Claude Crepeau

Expert In:

  • Computer security
  • Cryptographic protocols
  • Quantum computing
  • Quantum cryptography
View Profile
Profile photo of Ridha Khedri, expert at McMaster University

Ridha Khedri

Expert In:

  • Attacks on communication protocols
  • Software security
  • Automated relational calculus
  • Automated software testing
View Profile
Profile photo of Kshirasagar Naik, expert at University of Waterloo

Kshirasagar Naik

Expert In:

  • Dependability and security
  • Testing communication protocols
  • Application domains
  • Automatic meter reading
View Profile
Default profile photo

Habib-ur Rehman

Expert In:

  • Data analysis in networks and information security
  • Network and information security
  • Network protocol analysis and design
View Profile
Profile photo of Sherman Shen, expert at University of Waterloo

Sherman Shen

Expert In:

  • Network security
  • Security
  • Wireless application protocol
  • Application domains
View Profile

© | Expertise Finder | Toronto (Canada) | 1-888-978-5418 | info@expertisefinder.com | Home | Privacy | User Agreement

Powered by Link to expertisefinder.com