The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.01 - January/February (2006 vol.4)
pp: 7-8
Published by the IEEE Computer Society
ABSTRACT
<em>S&P</em> thanks the 2005 article reviewers.

    • Khalil Abuosba, The Arab Academy for Banking & Financial Sciences

    • Alessandro Acquisti, Carnegie Mellon Univ.

    • Tammy Alexander, Fountainhead College of Technology

    • William Allen, Florida Inst. of Technology

    • Jim Alves-Foss, Univ. of Idaho

    • Bill Arbaugh, Univ. of Maryland

    • Iván Arce, Core Security Technologies

    • Saurabh Bagchi, Purdue Univ.

    • Mark Baker, Univ. of Portsmouth

    • Magda Balazinska, MIT Lincoln Laboratory

    • Lujo Bauer, Carnegie Mellon Univ.

    • Steven Bellovin, Columbia Univ.

    • Marc Berejka, Microsoft

    • Louis Berzai, Univ. of Notre Dame

    • Marina Blanton, Purdue Univ.

    • Ji-Won Byun, Purdue Univ.

    • Ed Callaway, Motorola Labs

    • Michael A. Caloyannides, MITREtek Systems

    • B. Chandra, Indian Inst. of Technology, Hauz Khas

    • Scott Charney, Microsoft

    • Tzung-Her Chen, National Chung Hsing Univ.

    • Sheng-Tzong Cheng, National Cheng Kung Univ.

    • David Chess, IBM T.J. Watson Research Center

    • Vivek Chudgar, Foundstone Professional Services

    • Richard Clayton, Thinking Machines Corporation

    • Piotr Cofta, British Telecom

    • Jason Crampton, Royal Holloway, Univ. of London

    • Jason Crawford, IBM T.J. Watson Research Center

    • Robert Cunningham, MIT Lincoln Laboratory

    • Jeff Dagle, Pacific Northwest National Laboratory

    • Partha Dasgupta, Arizona State Univ.

    • George Datesman, MITREtek Systems

    • John Davis, MITREtek Systems

    • Jean-Francois Dhem, Gemplus

    • Sven Dietrich, CERT/CC

    • David L. Dill, Stanford Univ.

    • Christos Dimitriadis, Expertnet

    • Ronald Dodge, US Military Academy

    • Zoran Duric, George Mason Univ.

    • Julie Earp, North Carolina State Univ.

    • Shelby Evans, BBN Technologies

    • Lucas Ferreira, Unicamp

    • Richard Ford, Florida Inst. of Technology

    • Antoine Galland, Gemplus

    • Simson Garfinkel, MIT

    • Dan Geer, Verdasys

    • Jacob Glass, Princeton Univ.

    • Faith Heikkila, Nova Southeastern Univ.

    • Chuck Howell, MITRECorp.

    • John Ioannidis, Columbia Univ.

    • Cynthia Irvine, Naval Postgraduate School

    • Venkatesh Iyer, Intertwingle Research

    • Vandana Janeja, Rutgers Univ.

    • Jean-Louis Lanet, Gemplus

    • Eric Johnson, Dartmouth College

    • Douglas W. Jones, Univ. of Iowa

    • Nikhil Joshi, Polytechnic Univ., New York

    • Murat Kantarcioglu, Purdue Univ.

    • Yongdae Kim, Univ. of Minnesota

    • Engin Kirda, Technical Univ. of Vienna

    • Calvin Ko, Sparta ISSO

    • Cetin Koc, Oregon State Univ.

    • Henrik Kramshøj, Security6.net

    • Markus Kuhn, Univ. of Cambridge

    • Matthew Kwan, Unicrypt

    • Susan Landau, Sun Microsystems

    • Wenke Lee, Georgia Inst. of Technology

    • Brian Levine, Univ. of Massachusetts, Amherst

    • Elias Levy, Symantec

    • Jingtao Li, Purdue Univ.

    • Nancy Libin, Center for Democracy & Technology

    • Janet Light, Univ. of New Brunswick, Saint John

    • Anna Lysyanskaya, Brown Univ.

    • Paolo Maggi, Politecnico di Torino

    • Kuhanandha Mahalingam, Claflin Univ.

    • Muthucumaru Maheswaran, McGill Univ.

    • Lorenzo Martino, Università degli Studi di Milano

    • Fabio Massacci, Università di Trento

    • Don McGowan, Microsoft

    • Marco Mesiti, Università di Genova

    • Tom Messerges, Motorola Labs

    • Mehmet Mihcak, Beckman Inst.

    • Saraju Mohanty, Univ. of North Texas

    • Refik Molva, Institut Eurecom

    • John Morris, Center for Democracy & Technology

    • David Mundie, CERT/CC

    • Nicholas Murison, Foundstone

    • Rick Murphy, MITREtek Systems

    • Scott Musman, BAE Systems

    • Jose Nazario, Arbor Networks

    • Clifford Neuman, USC Information Sciences Inst.

    • Peter Neumann, SRI Int'l

    • Dieu Nguyen, Cyber Defense Agency

    • Alexander Novokhodko, Microsoft

    • Rolf Oppliger, eSECURITY Technologies

    • Laurent Oudot, Commissariat à l'Énergie Atomique

    • Lawrence O'Gorman, Avaya Labs

    • Paul C. Van Oorschot, Carleton Univ.

    • Vern Paxson, ICSI Center for Internet Research

    • Siani Pearson, Hewlett Packard Labs

    • Cyrus Peikari, Airscanner Mobile Security

    • Adrian Perrig, Carnegie Mellon Univ.

    • Shari Pfleeger, RAND

    • Venkatesha Prasad, Indian Inst. of Science

    • Jeremy Rand, Alcatel

    • Timothy Redmond, Stanford Univ.

    • Phil Reitinger, Microsoft

    • Karen Renaud, Univ. of Glasgow

    • Dan Roelker, BAE Systems

    • Jon Rokne, Univ. of Calgary

    • Volker Roth, Omaha Graphics and Media Labs

    • Dean Saxe, Foundstone

    • Anshu Saxena, Indian Inst. of Foreign Trade

    • Sami Saydjari, Cyber Defense Agency

    • Stuart E. Schechter, MIT Lincoln Labs

    • Matthew Schmid, Telemus Solutions

    • Bruce Schneier, Counterpane Systems

    • Gregg Schudel, Cisco

    • Mohamed Shehab, Purdue Univ.

    • Frederick Sheldon, Oak Ridge National Laboratory

    • Clay Shields, Georgetown Univ.

    • Muninder P. Singh, North Carolina State Univ.

    • Michael Skroch , Sandia National Laboratories

    • Howard Smith, Oracle

    • Brian Snow, US National Security Agency

    • David Sohn, Center for Democracy & Technology

    • Anna Squicciarini, Università degli Studi di Milano

    • Scott Stein, Microsoft

    • Martin R. Stytz, US Air Force

    • Hussein Suleman, Univ. of Cape Town

    • Arun Swaminathan, Fortify Software

    • Peter Szor, Symantec

    • Ling Tang, UniHub

    • Christiane Thu Thon, Gemplus

    • Laura Tinnel, Teknowledge

    • Kal Toth, Portland State Univ.

    • Alberto Trombetta, Univ. of Insubria

    • Gene Tsudik, USC Information Sciences Inst.

    • Fredrik Valeur, Univ. of California, Santa Barbara

    • Markus Volkmer, Hamburg Univ. of Science and Technology

    • Jesse Walker, Intel

    • James Wallner, Cyber Defense Agency

    • Dan Wallach, Rice Univ.

    • Chenxi Wang, Carnegie Mellon Univ.

    • Tim Weil, EF Kearney

    • Steve Weingart, GulfStream Tech.

    • Stephen Weis, MIT

    • Mathias Weske, Univ. of Potsdam

    • Marc Wilikens, Joint Research Centre

    • William Winsborough, Univ. of Texas at San Antonio

    • Wolfgang Woerndl, Technische Universität München

    • Carol Woody, Software Engineering Inst.

    • Daniel Wong, Oracle

    • Yanjun Wu, Inst. of Software, Chinese Academy of Sciences

    • Nick Xie, Carnegie Mellon Univ.

    • Gaoxi Xiao, Nanyang Technological Univ.

    • Alec Yasinsac, Florida State Univ.

    • Stefano Zanero, Politecnico di Milano

    • Tony Zawilski, MITRE

    • Dave Zubrow, Software Engineering Inst.

20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool