Tadayoshi Kohno, Ph.D.

Affiliations: 
2006 University of California, San Diego, La Jolla, CA 
Area:
Computer Science
Google:
"Tadayoshi Kohno"

Parents

Sign in to add mentor
Mihir Bellare grad student 2006 UCSD (Computer Science Tree)
 (Authenticated encryption in practice: Generalized composition methods and the secure shell, CWC, and WinZip schemes.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Camp J, Henry R, Kohno T, et al. (2020) Toward a Secure Internet of Things: Directions for Research Ieee Security & Privacy. 18: 28-37
Cobb C, Sudar S, Reiter N, et al. (2018) Computer security for data collection technologies. Development Engineering. 3: 1-11
Cleland-Huang J, Denning T, Kohno T, et al. (2016) Keeping Ahead of Our Adversaries Ieee Software. 33: 24-28
Jung J, Kohno T. (2014) Workshop on usable privacy & security for wearable and domestic ubiquitous devices (UPSIDE) Ubicomp 2014 - Adjunct Proceedings of the 2014 Acm International Joint Conference On Pervasive and Ubiquitous Computing. 1279-1282
Roesner F, Kohno TO, Molnar D. (2014) Security and privacy for augmented reality systems Communications of the Acm. 57: 88-96
Denning T, Kohno T, Levy HM. (2013) Computer security and the modern home Communications of the Acm. 56: 94-103
Zhu D(, Jung J, Song D, et al. (2011) TaintEraser Acm Sigops Operating Systems Review. 45: 142-154
Afanasyev M, Kohno T, Ma J, et al. (2011) Privacy-preserving network forensics Communications of the Acm. 54: 78-87
Maisel WH, Kohno T. (2010) Improving the security and privacy of implantable medical devices. The New England Journal of Medicine. 362: 1164-6
Gardner RW, Bishop M, Kohno T. (2009) Are patched machines really fixed? Ieee Security and Privacy. 7: 82-85
See more...