Tadayoshi Kohno, Ph.D.
Affiliations: | 2006 | University of California, San Diego, La Jolla, CA |
Area:
Computer ScienceGoogle:
"Tadayoshi Kohno"Parents
Sign in to add mentorMihir Bellare | grad student | 2006 | UCSD (Computer Science Tree) | |
(Authenticated encryption in practice: Generalized composition methods and the secure shell, CWC, and WinZip schemes.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Camp J, Henry R, Kohno T, et al. (2020) Toward a Secure Internet of Things: Directions for Research Ieee Security & Privacy. 18: 28-37 |
Cobb C, Sudar S, Reiter N, et al. (2018) Computer security for data collection technologies. Development Engineering. 3: 1-11 |
Cleland-Huang J, Denning T, Kohno T, et al. (2016) Keeping Ahead of Our Adversaries Ieee Software. 33: 24-28 |
Jung J, Kohno T. (2014) Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE) Ubicomp 2014 - Adjunct Proceedings of the 2014 Acm International Joint Conference On Pervasive and Ubiquitous Computing. 1279-1282 |
Roesner F, Kohno TO, Molnar D. (2014) Security and privacy for augmented reality systems Communications of the Acm. 57: 88-96 |
Denning T, Kohno T, Levy HM. (2013) Computer security and the modern home Communications of the Acm. 56: 94-103 |
Zhu D(, Jung J, Song D, et al. (2011) TaintEraser Acm Sigops Operating Systems Review. 45: 142-154 |
Afanasyev M, Kohno T, Ma J, et al. (2011) Privacy-preserving network forensics Communications of the Acm. 54: 78-87 |
Maisel WH, Kohno T. (2010) Improving the security and privacy of implantable medical devices. The New England Journal of Medicine. 362: 1164-6 |
Gardner RW, Bishop M, Kohno T. (2009) Are patched machines really fixed? Ieee Security and Privacy. 7: 82-85 |