a front
TRANSCRIPT
-
8/12/2019 A Front
1/40
Encyclopedia of Cryptography and Security
-
8/12/2019 A Front
2/40
-
8/12/2019 A Front
3/40
Henk C.A. van TilborgSushil Jajodia (Eds.)
Encyclopedia of Cryptographyand Security
With Figures and Tables
With Cross-references
1 3
-
8/12/2019 A Front
4/40
EditorsHenk C.A. van ilborg
Department o Mathematics and Computing Science
Eindhoven University o echnology
MB Eindhoven
Te Netherlands
Sushil Jajodia
Center or Secure Inormation Systems
George Mason University
Fairax, VA -
USA
ISBN ---- e-ISBN ----DOI ./----ISBN Bundle: ----Springer New York Dordrecht Heidelberg London
Library o Congress Control Number:
Springer Science+Business Media, LLC ,
All rights reserved. Tis work may not be translated or copied in whole or in part without the written permission o the publisher (SpringerScience+Business Media, LLC, Spring Street, New York, NY , USA), except or brie excerpts in connection with reviews or scholarlyanalysis. Use in connection with any orm o inormation storage and retrieval, electronic adaptation, computer sofware, or by similar ordissimilar methodology now known or hereafer developed is orbidden.Te use in this publication o trade names, trademarks, service marks, and similar terms, even i they are not identied as such, is not to betaken as an expression o opinion as to whether or not they are subject to proprietary rights.
Printed on acid-ree paper
Springer is part o Springer Science+Business Media(www.springer.com)
http://www.springer.com/http://www.springer.com/http://www.springer.com/http://www.springer.com/ -
8/12/2019 A Front
5/40
-
8/12/2019 A Front
6/40
-
8/12/2019 A Front
7/40
Preface to the First Edition
Te need to protect valuable inormation is as old as history. As ar back as Roman times, Julius Caesar saw the need
to encrypt messages by means o cryptographic tools. Even beore then, people tried to hide their messages by making
them invisible. Tese hiding techniques, in an interesting twist o history, have resuraced quite recently in the context
o digital rights management. o control access or usage o digital contents like audio, video, or sofware, inormation is
secretly embedded in the data!
Cryptology has developed over the centuries rom an art, in which only ew were skillul, into a science. Many people
regardthe Communication Teory andSecrecy Systems paper, by Claude Shannon in , as the oundation o modern
cryptology. However, at that time, cryptographic research was mostly restricted to government agencies and the military.
Tat situation gradually changed with the expanding telecommunication industry. Communication systems that were
completely controlled by computers demanded new techniques to protect the inormation owing through the network.
In , the paper New Directions in Cryptography, by Whiteld Diffie and Martin Hellman, caused a shock in the
academic community. Tis seminal paper showed that people who are communicating with each other over an insecureline can do so in a secure way with no need or a common secret key. In Shannons world o secret key cryptography
this was impossible, but in act there was another cryptologic world o public-key cryptography, which turned out to
have exciting applications in the real world. Te paper and the subsequent paper on the RSA cryptosystem in
also showed something else: mathematicians and computer scientists had ound an extremely interesting new area o
research, which was ueled by the ever-increasing social and scientic need or the tools that they were developing. From
the notion o public-key cryptography, inormation security was born as a new discipline and it now affects almost every
aspect o lie.
As a consequence, inormation security, and even cryptology, is no longer the exclusive domain o research labo-
ratories and the academic community. It rst moved to specialized consultancy rms, and rom there on to the many
places in the world that deal with sensitive or valuable data; or example the nancial world, the health care sector, public
institutions, nongovernmental agencies, human rights groups, and the entertainment industry.
A rich stream o papers and many good books have been written on inormation security, but most o them assumea scholared reader who has the time to start at the beginning and work his way through the entire text. Te time has
come to make important notions o cryptography accessible to readers who have an interest in a particular keyword
related to computer security or cryptology, but who lack the time to study one o the many books on computer and
inormation security or cryptology. At the end o , the idea to write an easily accessible encyclopedia on cryptography
and inormation security was proposed. Te goal was to make it possible to become amiliar with a particular notion, but
with minimal effort. Now, years later, the project is nished, thanks to the help o many contributors, people who are all
very busy in their proessional lie. On behal o the Advisory Board, I would like to thank each o those contributors or
their work. I would also like to acknowledge the eedback and help given by Mihir Bellare, Ran Canetti, Oded Goldreich,
Bill Heelan, Carl Pomerance, and Samuel S. Wagstaff, Jr. A person who was truly instrumental or the success o this
project is Jennier Evans at Springer Verlag. Her ideas and constant support are greatly appreciated. Great help has been
given locally by Anita Klooster and Wil Kortsmit. Tank you very much, all o you.
Henk C.A. van ilborg
-
8/12/2019 A Front
8/40
-
8/12/2019 A Front
9/40
-
8/12/2019 A Front
10/40
-
8/12/2019 A Front
11/40
Editors
Henk C.A. van Tilborg
Department o Mathematics and Computing Science
Eindhoven University o echnology
Eindhoven
Te Netherlands
Henk C.A. van ilborg is the Scientic Director o the research school EIDMA (Euler Institute or Discrete Mathematics
and its Applications) and the Eindhoven Institute or the Protection o Systems and Inormation EIPSI. He is a board
member o WIC (Werkgemeenschap voor Inormatie en Communicatietheorie).
Dr. van ilborg received his M.Sc. () and Ph.D. degree () rom the Eindhoven University o echnology, the
Netherlands. He was working as associate proessor at the university, beore he became a ull proessor in . During
he also served a part-time proessorship at the Dutch Open University. He has also been a visiting proessor at
Caliornia Institute o echnology, the University o Pretoria and Macquarie University and visiting scientist at the IBM
Almaden Research Center and Bell Laboratories.
He has been involved in the organization o many international conerences. He was the program committee co-chairo ISI- (IEEE International Symposium on Inormation Teory), Germany. He was Program Committee Member o
WCC, WCC, WCC, WCC, and WCC (Workshop on Coding theory and Cryptography). He has
been the advisor o about Ph.D. and M.Sc. students in the area o coding theory and cryptography.
Dr. van ilborg has written three books, two on cryptology and one on coding theory. He is the (co-)author o more
than articles in leading journals and also holds two patents. He is the Associate editor o Designs, Codes and Cryp-
tography and Journal o Combinatorics, Inormation & System Sciences. From April December he was the
Associate editor or the Journal o the Indonesian Mathematical Society. He is also the Advisory editor o Advances in
Mathematics o Communications since January and editor o the Asian-European Journal o Mathematics.
Webpage:http://www.win.tue.nl/~henkvt/
http://www.win.tue.nl/~henkvt/http://www.win.tue.nl/~henkvt/ -
8/12/2019 A Front
12/40
xii Editors
Sushil Jajodia
Center or Secure Inormation Systems
George Mason University
Fairax, VA
USA
Sushil Jajodia is University Proessor, BDM International Proessor, and the director o Center or Secure Inormation
Systems in the Volgenau School o Engineering at the George Mason University, Fairax, Virginia. He served as the chair
o the Department o Inormation and Sofware Engineering during . He joined Mason afer serving as thedirector o the Database and Expert Systems Program within the Division o Inormation, Robotics, and Intelligent Sys-
tems at the National Science Foundation. Beore that he was the head o the Database and Distributed Systems Section
in the Computer Science and Systems Branch at the Naval Research Laboratory, Washington and Associate Proessor o
Computer Science and Director o Graduate Studies at the University o Missouri, Columbia. He has also been a visiting
proessor at the University o Milan, Italy; Sapienz University o Rome, Italy; Isaac Newton Institute or Mathematical
Sciences, Cambridge University, England; and Kings College,London, England.
Dr. Jajodia received hisPhD rom the Universityo Oregon, Eugene. Te scope o hiscurrent research interestsencom-
passes inormation secrecy, privacy, integrity, and availability problems in military, civil, and commercial sectors. He has
authored six books, edited thirty seven books and conerence proceedings, and published more than technical papers
in the reereed journals and conerence proceedings. He is alsoa holdero eight patents and has several patent applications
pending. He received the IFIP C Kristian Beckman award, Volgenau School o Engineering Outstanding
Research Faculty Award and ACM SIGSAC Outstanding Contributions Award, and IFIP WG . Outstand-ing Research Contributions Award. He was recognized or the most accepted papers at the th anniversary o the IEEE
Symposium on Security and Privacy. His h-index is and Erdos number is .
Dr. Jajodia has served in different capacities or various journals and conerences. He serves on the editorial boards
o IE Inormation Security, International Journal o Inormation and Computer Security, and International Journal
o Inormation Security and Privacy. He was the ounding editor-in-chie o the Journal o Computer Security (
) and a past editor o ACM ransactions on Inormation and Systems Security () and IEEE ransactions
on Knowledge and Data Engineering. He is the consulting editor o the Springer International Series on Advances in
Inormation Security. He has been named a Golden Core member or his service to the IEEE Computer Society, and
received International Federation or Inormation Processing (IFIP) Silver Core Award in recognition o outstanding
services to IFIP in . He is a past chair o the ACM Special Interest Group on Security, Audit, and Control (SIGSAC),
IEEE Computer Society echnical Committee on Data Engineering, and IFIP WG . on Systems Integrity and Control.
He is a senior member o the IEEE and a member o IEEE Computer Society and Association or Computing Machinery.Webpage:http://csis.gmu.edu/aculty/jajodia.html
http://csis.gmu.edu/faculty/jajodia.htmlhttp://csis.gmu.edu/faculty/jajodia.html -
8/12/2019 A Front
13/40
Editorial Board
Carlisle Adams
School of Information Technology and Engineering(SITE)University of [email protected]
Friedrich L. Bauer
Gerrit Bleumer
Research and DevelopmentFrancotyp GroupBirkenwerder bei [email protected]
Dan Boneh
Department of Computer ScienceStanford UniveristyStanford, [email protected]
Pascale Charpin
INRIARocquencourtLe Chesnay Cedex
Claude Crpeau
School of Computer ScienceMcGill [email protected]
Ernesto Damiani
Dipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)[email protected]
Sabrina De Capitani di Vimercati
DTI-Dipartimento di Tecnologie dellInformazioneUniversit degli Studi di [email protected]
Marijke De Soete
Yvo Desmedt
Department of Computer ScienceUniversity College LondonLondonUnited [email protected]
Somesh Jha
Department of Computer ScienceUniversity of Wisconsin
Madison, [email protected]
Gregory Kabatiansky
Dobrushin Mathematical LabInstitute for Information Transmission Problems [email protected]
-
8/12/2019 A Front
14/40
xiv Editorial Board
Angelos Keromytis
Department of Computer ScienceColumbia UniversityNew York, NYUSA
Tanja Lange
Coding Theory and Cryptology, Eindhoven Institute forthe Protection of Systems and Information, Departmentof Mathematics and Computer ScienceTechnische Universiteit EindhovenEindhovenThe [email protected]
Catherine Meadows
U.S. Naval Research LaboratoryWashington, [email protected],[email protected]
Alfred Menezes
Department of Combinatorics and OptimizationUniversity of WaterlooWaterlooOntarioCanada
David Naccache
Dpartement dinformatique, Groupe de cryptographiecole normale [email protected]
Sukumaran Nair
Department of Computer Science and EngineeringBobby B. Lyle School of Engineering
Southern Methodist [email protected]
Peng Ning
Department of Computer ScienceNorth Carolina State UniversityRaleigh, [email protected]@ncsu.edu
Christof Paar
Horst Gortz Institute for IT Security, Chair for EmbeddedSecurityRuhr-Universitatet BochumBochum
Stefano Paraboschi
Dipartimento di Ingegneria dellInformazione e MetodiMatematiciUniversit degli Studi di BergamoDalmine, [email protected]
Vincenzo PiuriDipartimento di Tecnologie dellInformazioneUniversita degli Studi di MilanoCrema (CR)Italy
Bart Preneel
Department of Electrical Engineering-ESAT/COSICKatholieke Universiteit Leuven and IBBTLeuven-Heverlee
Jean-Jacques Quisquater
Microelectronics LaboratoryUniversit catholique de LouvainLouvain-la-NeuveBelgiumJean-Jacques.Quisquater@uclouvain.be
Kazue Sako
Pierangela Samarati
Dipartimento di Tecnologie dellInformazioneUniversit degli Studi di [email protected]
-
8/12/2019 A Front
15/40
Editorial Board xv
Berry Schoenmakers
Technische Universiteit EindhovenEindhovenThe [email protected]
Sean W. Smith
Department of Computer ScienceDartmouth CollegeHanover, [email protected]
Angelos Stavrou
Computer Science DepartmentSchool Information Technology and EngineeringGeorge Mason UniversityFairfax, VA
Patrick Traynor
School of Computer ScienceGeorgia Institute of TechnologyAtlanta, GAUSA
Sencun Zhu
Department of Computer Science and EngineeringPennsylvania State UniversityUniversity Park, [email protected]
-
8/12/2019 A Front
16/40
-
8/12/2019 A Front
17/40
List of Contributors
SAEED ABU-NIMEHDamballa Inc.Atlanta, GAUSA
NABIL ADAMDepartment of Management Science and InformationSystems, CIMICRutgers, The State University of New JerseyNewark, NJ
USA
CARLISLE ADAMSSchool of Information Technology and Engineering(SITE)University of OttawaOttawa, OntarioCanada
MALEK ADJOUADIDepartment of Electrical and Computer EngineeringFlorida International UniversityMiamiFlorida
CHARU C. AGGARWALIBM T. J. Watson Research CenterHawthorne, NYUSA
VIJAY ALTURIManagement Science and Information SystemsDepartmentCenter for Information Management, Integration andConnectivityRutgers UniversityNewark, NJUSA
JIM ALVES-FOSSDepartment of Computer ScienceUniversity of IdahoMoscow, IDUSA
CLAUDIO A. ARDAGNADipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)
Italy
ROBERTO AVANZIRuhr-Universitt BochumBochumGermany
GILDAS AVOINEUniversit catholique de LouvainLouvain-la-Neuve
Belgium
ALI BAGHERZANDIDonald Bren School of Computer ScienceUniversity of CaliforniaIrvine, CAUSA
SUMAN BANERJEEDepartment of Computer SciencesUniversity of Wisconsin at MadisonMadison, WIUSA
ALEXANDER BARGDepartment of Electrical and Computer EngineeringUniversity of MarylandCollege Park, MDUSA
-
8/12/2019 A Front
18/40
xviii List o f Contributors
PAULO S.L.M.BARRETODepartment of Computer and Digital SystemsEngineering (PCS)Escola PolitcnicaUniversity of So Paulo (USP)
So PauloBrazil
FRIEDRICH L. BAUERKottgeiseringGermany
HOMAYOONBEIGIResearchRecognition Technologies, Inc.
Yorktown Heights, NYUSA
DAVID ELLIOTT BELLRestonVAUSA
STEVEN M. BELLOVINDepartment of Computer Science
Columbia UniversityNew York, NYUSA
OLIVIER BENOTIngenicoRgion de Saint-tienneFrance
DANIEL J. BERNSTEIN
Department of Computer ScienceUniversity of Illinois at ChicagoChicago, IllinoisUSA
CLAUDIO BETTINIDipartimento di Informatica e Comunicazione (DICo)Universit degli Studi di MilanoMilanoItaly
BIR BHANUCenter for Research in Intelligent SystemsUniversity of CaliforniaRiverside, CAUSA
KAIGUI BIANDepartment of Electrical and Computer EngineeringVirginia TechBlacksburg, VAUSA
FRDRIQUE BIENNIERLIESPINSA de LyonVilleurbanneFrance
ELI BIHAMDepartment of Computer ScienceTechnion Israel Institute of TechnologyHaifaIsrael
ALEX BIRYUKOVFDEF, Campus Limpertsberg
University of LuxembourgLuxembourg
JOACHIMBISKUPFakultt fr InformatikTechnische Universitt DortmundDortmundGermany
SOMA BISWAS
Department of Electrical and Computer EngineeringCenter for Automation ResearchUniversity of MarylandCollege Park, MDUSA
J. BLACKDepartment of Computer ScienceBoulder, COUSA
-
8/12/2019 A Front
19/40
-
8/12/2019 A Front
20/40
xx List of Contributors
TOM CADDYInfoGard LaboratoriesSan Luis Obispo, CAUSA
JON CALLASPGP CorporationMenlo park, CAUSA
ALESSANDRO CAMPIDipartimento di Elettronica e InformazionePolitecnico di MilanoMilanoItaly
PATRIZIO CAMPISIDepartment of Applied ElectronicsUniversit degli Studi Roma TRERomeItaly
RAN CANETTIThe Blavatnik School of Computer SciencesTel Aviv University
Ramat Aviv, Tel AvivIsrael
HAKKI C. CANKAYADepartment of Computer EngineeringIzmir University of EconomicsIzmirTurkey
EBRU CELIKEL CANKAYA
Department of Computer Science and EngineeringUniversity of North TexasDenton, TXUSA
CHRISTOPHE DE CANNIREDepartment of Electrical EngineeringKatholieke Universiteit LeuvenLeuven-HeverleeBelgium
ANNE CANTEAUTProject-Team SECRETINRIA Paris-RocquencourtLe ChesnayFrance
GUOHONG CAOMobile Computing and Networking (MCN) LabDepartment of Computer Science and EngineeringThe Pennsylvania State UniversityUniversity Park, PAUSA
SRDJAN CAPKUNSystem Security Group
Department of Computer ScienceETH ZurichZrichSwitzerland
CLAUDE CARLETDpartement de mathmatiques and LAGAUniversit Paris Saint-Denis CedexFrance
WILLIAM D. CASPERHigh Assurance Computing and Networking Labs(HACNet)Department of Computer Science and EngineeringBobby B. Lyle School of EngineeringSouthern Methodist UniversityHouston, TXUSA
ANN CAVOUKIAN
Information and Privacy Commissioners Office ofOntarioToronto, ONCanada
DAVID CHALLENERApplied Physics LaboratoryJohns Hopkins UniversityLaurel, MDUSA
-
8/12/2019 A Front
21/40
List of Contributors xxi
PASCALECHARPININRIARocquencourtLe Chesnay CedexFrance
RAMA CHELLAPPACenter for Automation ResearchDepartment of Electrical and Computer EngineeringUniversity of MarylandCollege Park, MDUSA
BEE-CHUNG CHENYahoo! Research
Mountain View, CAUSA
YU CHENDepartment of Electrical and Computer EngineeringFlorida International UniversityMiamiFlorida
CHEN-MOU CHENGDepartment of Electrical EngineeringNational Taiwan UniversityTaipeiTaiwan
YOUNG B. CHOIDepartment of Natural Science, Mathematics andTechnologySchool of Undergraduate Studies Regent UniversityVirginia Beach, VAUSA
HAMID CHOUKRIGemalto Compagny
MIHAI CHRISTODORESCUIBM T.J. Watson Research CenterHawthorne, NYUSA
STELVIO CIMATODepartment of Information TechnologiesUniversit degli Studi di MilanoCrema (CR)Italy
ANDREW CLARKInformation Security InstituteQueensland University of TechnologyBrisbaneQueenslandAustralia
DANNY DE COCKDepartment of Electrical Engineering-ESAT/COSICK.U. Leuven and IBBTLeuven-HeverleeBelgium
SCOTT CONTINISilverbrook ResearchNew South WalesAustralia
DEBBIE COOKTelcordia Applied Research
PiscatawayNew JerseyUSA
SCOTT E. COULLRedJack, LLC.Silver Spring, MDUSA
CLAUDE CRPEAU
School of Computer ScienceMcGill UniversityMontreal, QuebecCanada
LORRIE FAITH CRANORSchool of Computer ScienceCarnegie Mellon UniversityPittsburg, PAUSA
-
8/12/2019 A Front
22/40
xxii List of Contributors
ERIC CRONINCIS DepartmentUniversity of PennsylvaniaPhiladelphia, PAUSA
SCOTT CROSBYDepartment of Computer ScienceRice UniversityHouston, TXUSA
MARY J. CULNANInformation and Process Management DepartmentBentley UniversityWaltham, MAUSA
FRDRIC CUPPENSLUSSI DepartmentTELECOM BretagneCesson Svign CEDEXFrance
NORA CUPPENS-BOULAHIALUSSI Department
TELECOM BretagneCesson Svign CEDEXFrance
REZA CURTMOLADepartment of Computer ScienceNew Jersey Institute of Technology (NJIT)Newark, NJUSA
ITALO DACOSTADepartment of Computer SciencesGeorgia Institute of TechnologyParis, AtlantaUSA
JOAN DAEMENSTMicroelectronicsZaventemBelgium
ERNESTO DAMIANIDipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italia
SABRINA DE CAPITANI DI VIMERCATIDipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italy
MARIJKE DE SOETESecurityBizOostkampBelgium
ALEXANDER W. DENTInformation Security GroupRoyal HollowayUniversity of LondonEgham, SurreyUK
YVO DESMEDTDepartment of Computer ScienceUniversity College London
LondonUK
YEVGENIY DODISDepartment of Computer ScienceNew York UniversityNew YorkUSA
JOSEP DOMINGO-FERRERDepartment of Computer Engineering and
MathematicsUniversitat Rovira i VirgiliTarragonaCatalonia
JING DONGDepartment of Computer SciencePurdue UniversityWest Lafayette, INUSA
-
8/12/2019 A Front
23/40
List of Contributors xxiii
GLENN DURFEESan Francisco, CAUSA
CYNTHIA DWORKMicrosoft Research, Silicon ValleyMountain View, CAUSA
WESLEY EDDYVerizon/NASA Glenn Research CenterCleveland,OhioUSA
THOMAS EISENBARTHDepartment of Mathematical SciencesFlorida Atlantic University
CARL M. ELLISONNew York, USA
WILLIAM ENCKDepartment of Computer Science and EngineeringThe Pennsylvania State University
University Park, PAUSA
PAUL ENGLANDMicrosoft CorporationRedmond, WAUSA
AARON ESTESDepartment of Computer Science and Engineering,
Lyle School of EngineeringSouthern Methodist UniversityDallas, TXUSA
MARTIN EVISONForensic Science ProgramUniversity of TorontoMississauga, ONCanada
SERGE FENETLIRIS UMR Universit Claude Bernard Lyon Villeurbanne cedexFrance
DAVID FERRAIOLONational Institute of Standards and TechnologyGaithersburg, MDUSA
MATTHIEU FINIASZENSTAFrance
CAROLINE FONTAINELab-STICC/CID and Telecom Bretagne/ITICNRS/Lab-STICC/CID and Telecom BretagneBrest Cedex France
SARA FORESTIDipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italy
DARIO V. FORTEFounder and CEODFLabsCrema/CRItalyand
University of MilanoCremaItaly
MATTHEW K. FRANKLINComputer Science DepartmentUniversity of CaliforniaDavis, CAUSA
-
8/12/2019 A Front
24/40
-
8/12/2019 A Front
25/40
List of Contributors xxv
QIJUN GUDepartment of Computer ScienceTexas State University-San MarcosSan Marcos, TexasUSA
JORGE GUAJARDOBosch Research and Technology Center North AmericaPittsburghUSA
YANLI GUOINRIA RocquencourtLe ChesnayFrance
STUART HABERHP LabsPrincetonNew JerseyUSA
HAKAN HACIGIMSNEC Research LabsCupertino, CAUSA
HELENA HANDSCHUHComputer Security and Industrial CryptographyResearch GroupKatholieke Universiteit LeuvenLeuven - HeverleeBelgium
DARREL HANKERSONDepartment of MathematicsAuburn UniversityAuburn, ALUSA
CLEMENS HEINRICHFrancotyp-Postalia GmbHBirkenwerderGermany
TOR HELLESETHThe Selmer CenterDepartment of InformaticsUniversity of BergenBergen
Norway
NADIA HENINGERDepartment of Computer SciencePrinceton UniversityUSA
JEFF HOFFSTEINMathematics DepartmentBrown UniversityProvidence, RI
USA
BIJIT HOREDonald Bren School of Computer ScienceUniversity of CaliforniaIrvine, CAUSA
DWIGHT HORNEDepartment of Computer Science and Engineering
Southern Methodist UniversityDallas, TXUSA
RUSS HOUSLEYVigil Security, LLCHerndon, VAUSA
JEAN-PIERRE HUBAUXSchool of Computer and Communication Sciences
cole PolytechniqueFdrale de LausanneLausanneSwitzerland
MICHAEL T. HUNTERSchool of Computer ScienceGeorgia Institute of TechnologyAtlanta, GAUSA
-
8/12/2019 A Front
26/40
xxvi List o f Contributors
MICHAEL HUTHDepartment of ComputingImperial College LondonLondonUK
SANGWON HYUNDepartment of Computer ScienceNorth Carolina State UniversityRaleigh, NCUSA
HIDEKI IMAIChuo UniversityBunkyo-kuTokyo
Japan
SEBASTIAAN INDESTEEGEDepartment of Electrical Engineering-ESAT/COSICKatholieke Universiteit Leuven and IBBTLeuven-HeverleeBelgium
JOHN IOANNIDISGoogle, Inc.
New York, NYUSA
ARUN IYENGARIBM Research DivisionThomas J. Watson Research CenterYorktown Heights, NYUSA
COLLIN JACKSONCyLab, Department of Electrical and Computer
EngineeringCarnegie Mellon UniversityMoffett Field, CAUSA
TRENT JAEGERSystems and Internet Infrastructure Security LabPennsylvania State UniversityUniversity Park, PAUSA
GOCE JAKIMOSKIElectrical and Computer EngineeringStevens Institute of TechnologyHoboken, NJUSA
MARTIN JOHNSSAP Research CEC KarlsruheSAP AGD- KarlsruheGermany
ANTOINE JOUXLaboratoire PrismUniversit de Versailles Saint-Quentin-en-YvelinesVersailles CedexFrance
MARC JOYETechnicolor Security & Content Protection LabsCesson-Svign CedexFrance
MIKE JUSTGlasgow Caledonian UniversityGlasgow, Scotland
UK
STEFAN KPSELLInstitute of Systems ArchitectureDepartment of Computer ScienceTechnische UniversitatDresdenGermany
GREGORY KABATIANSKY
Dobrushin Mathematical LabInstitute for Information Transmission Problems RASMoscowRussia
BURT KALISKIOffice of the CTOEMC CorporationHopkinton, MAUSA
-
8/12/2019 A Front
27/40
List of Contributors xxvii
BRENT BYUNG HOON KANGDepartment of Applied Information Technology andCentre for Secure Information SystemsThe Volgenau School of EngineeringGeorge Mason University
Fairfax, VAUSA
VIVEK KANHANGADBiometrics Research CentreDepartment of ComputingThe Hong Kong Polytechnic UniversityHung HomKowloonHong Kong
TIMO KASPERHorst Grst Institute for IT SecurityRuhr University Bochum
STEFAN KATZENBEISSERSecurity Engineering GroupTechnische Universitt DarmstadtDarmstadtGermany
ANGELOS D. KEROMYTISDepartment of Computer ScienceColumbia UniversityNew York, NYUSA
GEORGE KESIDISComputer Science & Engineering and ElectricalEngineering DepartmentsPennsylvania State UniversityUniversity Park, PAUSA
AGGELOS KIAYIASDepartment of Computer Science EngineeringUniversity of ConnecticutStorrs, CTUSA
DANIEL KIFERDepartment of Computer Science and EngineeringPenn State UniversityUniversity Park, PAUSA
JOHANNES KINDERFormal Methods in Systems EngineeringTechnische Universitt DarmstadtDarmstadtGermany
ENGIN KIRDAInstitut EurecomSophia Antipolis
France
AMIT KLEINTrusteerTel AvivIsrael
LARS R. KNUDSENDepartment of MathematicsTechnical University of Denmark
LyngbyDenmark
CETIN KAYAKOCollege of Engineering and Natural SciencesIstanbul Sehir UniversityUskudarIstanbulTurkey
FRANOIS KOEUNEMicroelectronics LaboratoryUniversit catholique de LouvainLouvain-la-NeuveBelgium
HUGO KRAWCZYKIBM T.J. Watson Research CenterNYUSA
-
8/12/2019 A Front
28/40
xxvi ii List of Contributors
ALEXANDER KRUPPAProjet CACAOLORIAVillers-ls-Nancy CedexFrance
KRZYSZTOF KRYSZCZUKIBM Zurich Research Laboratory (DTI)LausanneSwitzerland
MARKUS KUHNComputer LaboratoryUniversity of CambridgeCambridgeUK
KAORU KUROSAWADepartment of Computer and Information SciencesIbaraki UniversityHitachi-shiJapan
RUGGERO DONIDA LABATIDipartimento di Tecnologie dellInformazioneUniversit degli Studi di MilanoCrema (CR)
Italy
PETER LANDROCKCryptomathicUK
JEAN-LOUIS LANETXLIM, Department of Mathematics and ComputerScienceUniversity of LimogesLimoges
France
TANJA LANGECoding Theory and CryptologyEindhoven Institute for the Protection of Systems andInformationDepartment of Mathematics and Computer ScienceTechnische Universiteit EindhovenEindhovenThe Netherlands
GREGOR LEANDERDepartment of MathematicsTechnical University of DenmarkLyngbyDenmark
ADAM J. LEEDepartment of Computer ScienceUniversity of PittsburghPittsburgh, PAUSA
ELISABETH DE LEEUWSiemens IT Solutions and Services B.V.ZoetermeerThe Netherlands
KRISTEN LEFEVREDepartment of Electrical Engineering and ComputerScienceUniversity of MichiganAnn Arbor, MIUSA
ARJEN K. LENSTRALaboratory for cryptologic algorithms - LACALSchool of Computer and Communication Sciences
cole Polytechnique Fdrale de LausanneSwitzerland
REYNALD LERCIERInstitut de recherche mathmatique de RennesUniversit de Rennes Rennes CedexFrance
PAUL LEYLANDBrnikat Limited
Little ShelfordCambridgeUK
STAN Z. LICenter for Biometrics and Security ResearchInstitute of AutomationChinese Academy of SciencesBeijingPublic Republic of China
-
8/12/2019 A Front
29/40
List of Contributors xxix
NINGHUI LIDepartment of Computer SciencePurdue UniversityWest Lafayette, IndianaUSA
MING LIDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA
BENOT LIBERTMicroelectronics LaboratoryUniversit catholique de LouvainLouvain-la-Neuve
Belgium
MYEONG L. LIMDepartment of Applied Information Technology andCentre for Secure Information SystemsThe Volgenau School of EngineeringGeorge Mason UniversityFairfax, VAUSA
SHINYOUNGLIM
School of Health and Rehabilitation ServicesUniversity of PittsburghPittsburgh, PAUSA
MOSES LISKOVDepartment of Computer ScienceThe College of William and MaryWilliamsburg, VAUSA
DONGGANG LIUDepartment of Computer Science and EngineeringThe University of Texas at ArlingtonArlington, TexasUSA
ZONGYI LIUAmazon.comSeattle, WAUSA
GIOVANNI LIVRAGADipartimento di Tecnologie dellInformazione (DTI)Universit degli Studi di MilanoCrema (CR)Italy
STEVE LLOYDSphyrna Security IncorporatedSteve Lloyd Consulting Inc.Ottawa, ONCanada
MICHAEL E. LOCASTODepartment of Computer ScienceGeorge Mason UniversityFairfax, VA
USA
WENJING LOUWireless Networking and SecurityDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA
HAIBING LUDepartment of Management Science and InformationSystems, CIMICRutgers, The State University of New JerseyNewark, NJUSA
BODO MLLERGoogle Switzerland GmbHZurichSwitzerland
ASHWIN MACHANAVAJJHALAYahoo! ResearchSanta Clara, CAUSA
EMANUELE MAIORANADepartment of Applied ElectronicsUniversit degli Studi Roma TRERomeItaly
-
8/12/2019 A Front
30/40
xxx List of Contributors
HEIKO MANTELDepartment of Computer ScienceTU DarmstadtDarmstadtGermany
DAVIDE MARTINENGHIDipartimento di Elettronica e InformazionePolitecnico di MilanoMilanoItaly
HENRI MASSIASUniversity of LimogesFrance
LEE D. MCFEARINDepartment of Computer Science and EngineeringSouthern Methodist UniversityDallas, TXUSA
DAVID MCGREWPoolesville, MDUSA
CATHERINE MEADOWSU.S. Naval Research LaboratoryWashington, DCUSA
SHARAD MEHROTRADonald Bren School of Computer ScienceUniversity of CaliforniaIrvine, CAUSA
ALFRED MENEZESDepartment of Combinatorics and OptimizationUniversity of WaterlooWaterloo, OntarioCanada
DANIELE MICCIANCIODepartment of Computer Science & EngineeringUniversity of CaliforniaSan Diego, CAUSA
EVANGELIA MICHELI-TZANAKOUDepartment of Biomedical EngineeringRutgers - The State University of New JerseyPiscataway, NJUSA
JONATHAN K. MILLENThe MITRE CorporationBedford, MAUSA
JELENA MIRKOVICInformation Sciences InstituteUniversity of Southern CaliforniaMarina del Rey, CAUSA
FRANOIS MORAINLaboratoire dinformatique (LIX)cole polytechniquePalaiseau CedexFrance
THOMAS MORRISDepartment of Electrical and Computer EngineeringMississippi State University
Mississippi State, MSUSA
HAROLD MOUCHREPolytech NantesUniversit de Nantes, IRCCyNNantesFrance
NICKY MOUHA
Department of Electrical EngineeringKatholieke Universiteit LeuvenLeuven-HeverleeBelgium
DAVID NACCACHEDpartement dinformatique, Groupe de cryptographiecole normale suprieureParisFrance
-
8/12/2019 A Front
31/40
List of Contributors xxxi
DANIEL NAGYDepartment of Computer ScienceELTECRYPT Research Group Etvs Lrnd UniversityBudapestHungary
PADMARAJ M. V. NAIRDepartment of Computer Science and EngineeringSchool of EngineeringSouthern Methodist UniversityDallas, TXUSA
DALIT NAORDepartment of Computer Science and AppliedMathematics
Weizmann Institute of ScienceRehovotIsrael
GEORGE NECULAElectrical Engineering and Computer ScienceUniversity of CaliforniaBerkeley, CAUSA
ALESSANDRO NERI
Department of Applied ElectronicsUniversit degli Studi Roma TRERomeItaly
KIM NGUYENBundesdruckerei GmbHBerlinGermany
PHONG NGUYEN
Dpartement dinformatiqueEcole normale suprieureParis, Cedex France
PENG NINGDepartment of Computer ScienceNorth Carolina State UniversityRaleigh, NCUSA
CRISTINA NITA-ROTARUDepartment of Computer SciencePurdue UniversityWest Lafayette, INUSA
ANITA OCHIEANOVisa InternationalFoster City, CAUSA
TAE OHSchool of InformaticsRochester Institute of TechnologyRochester, NY
USA
FRANCIS OLIVIERDepartment of Security TechnologyGemplus Card InternationalFrance
ARKADIUSZ OROWSKIInstitute of PhysicsPolish Academy of SciencesWarsawPolandandDepartment of InformaticsWULS - SGGWWarsawPoland
ALESSANDRO ORSOCollege of Computing - School of Computer Science
Georgia Institute of TechnologyAtlanta, GAUSA
AKIRA OTSUKAResearch Center for Information SecurityNational Institute of Advanced Industrial Science andTechnologyTokyoJapan
-
8/12/2019 A Front
32/40
xxxii List of Contributors
CHRISTOF PAARLehrstuhl Embedded Security, Gebaeude IC /Ruhr-Universitaet BochumBochumGermany
PASCALPAILLIERCryptoExpertsParisFrance
STEPHEN M. PAPAHigh Assurance Computing and Networking Labs(HACNet)Department of Computer Science and EngineeringBobby B. Lyle School of Engineering
Southern Methodist UniversityHouston, TXUSA
PANOS PAPADIMITRATOSSchool of Computer and Communication Sciencescole Polytechnique Fdrale de Lausanne, LausanneSwitzerland
STEFANO PARABOSCHIDipartimento di Ingegneria dellInformazione e MetodiMatematiciUniversit degli Studi di BergamoDalmine, BGItaly
JUNG-MIN JERRYPARKDepartment of Electrical and Computer EngineeringVirginia TechBlacksburg, VAUSA
JACQUES PATARINVersailles St-Quentin-en-Yvelines UniversityFrance
BRYAN D. PAYNEInformation Systems AnalysisSandia National LaboratoriesAlbuquerque, NMUSA
CLAUDE CRPEAUSchool of Computer ScienceMcGill UniversityMontreal, QuebecCanada
TORBEN PEDERSENCryptomathicrhusDenmark
GERARDO PELOSIDipartimento di Elettronica e Informazione (DEI)Politecnico di MilanoMilanoItalyandDipartimento di Ingegneria dellInformazione e MetodiMatematici (DIIMM)University of BergamoDalmine (BG)Italy
GNTHER PERNULLS fr Wirtschaftsinformatik I -Informationssysteme
Universitt RegensburgRegensburgGermany
CHRISTIANE PETERSDepartment of Mathematics and Computer ScienceTechnische Universiteit EindhovenThe Netherlands
CHRISTOPHE
PETIT
Microelectronics LaboratoryUniversit catholique de LouvainLouvain-la-NeuveBelgium
FABIEN A. P. PETITCOLASMicrosoft ResearchCambridgeUK
-
8/12/2019 A Front
33/40
List of Contributors xxxiii
BENNY PINKASDepartment of Computer ScienceUniversity of HaifaHaifaIsrael
KONSTANTINOSN. PLATANIOTISThe Edward S Rogers Sr. Department of Electrical &Computer Engineeringand Knowledge Media DesignInstituteUniversity of TorontoToronto, ONCanada
ANGELIKA PLATEDirector, AEXIS Security ConsultantsBonnGermany
FERNANDO L. PODIOITL Computer Security Division/Systems and EmergingTechnologies Security Research GroupNational Institute of Standards and Technology (NIST)Gaithersburg, MDUSA
DAVID POINTCHEVALComputer Science DepartmentEcole normale suprieureParisFrance
MICHALIS POLYCHRONAKISDepartment of Computer Science
Network Security LabColumbia UniversityNew York, NYUSA
DENIS V. POPELAlgorithms Research CorporationCharlottesville, VAUSA
BART PRENEELDepartment of Electrical Engineering-ESAT/COSICKatholieke Universiteit Leuven and IBBTLeuven-HeverleeBelgium
NIELS PROVOSGoogle INCMountain View, CAUSA
JEAN-JACQUES QUISQUATERMicroelectronics LaboratoryUniversit catholique de Louvain
Louvain-la-NeuveBelgium
RADMILO RACICDepartment of Computer ScienceUniversity of CaliforniaDavis, CAUSA
MOHAMED OMAR RAYESDepartment of Computer Science and EngineeringBobby B. Lyle School of Engineering SouthernMethodist UniversityDallas, TXUSA
KUI RENUbiquitous Security & PrivaCy Research Laboratory(UbiSeC Lab)Department of Electrical and Computer Engineering
Illinois Institute of TechnologyChicago, ILUSA
JONAS RICHIARDIEcole PolytechniqueFdrale de Lausanne EPFL - STI IBILausanneSwitzerland
-
8/12/2019 A Front
34/40
xxxiv List of Contributors
MORITZ RIESNERDepartment of Information SystemsUniversity of RegensburgRegensburgGermany
VINCENT RIJMENDepartment of Electrical Engineering/ESATKatholieke Universiteit LeuvenHeverleeBelgium
RONALD L. RIVESTDepartment of Electrical Engineering and ComputerScienceMassachusetts Institute of TechnologyCambridge, MAUSA
MATTHEW J. B. ROBSHAWOrange LabsIssy Moulineaux, Cedex France
ARNON ROSENTHALThe MITRE Corporation
Bedford, MAUSA
ARUN ROSSDepartment of Computer Science and ElectricalEngineeringWest Virginia UniversityMorgantown, WVUSA
SCOTT A. ROTONDOOracle CorporationRedwood Shores, CAUSA
JUNGWOO RYOODivision of Business and EngineeringPenn State AltoonaAltoona, PAUSA
KAZUE SAKONECKawasakiJapan
MALEK BEN SALEMDepartment of Computer ScienceColumbia UniversityNew York, NYUSA
GUIDO SALVANESCHIDepartment of Electronic and InformationPolytechnic of MilanMilanoItaly
PAOLO SALVANESCHIDepartment of Information Technology andMathematical MethodsUniversity of BergamoDalmine, BGItaly
PIERANGELA SAMARATIDipartimento di Tecnologie dellInformazione (DTI)
Universit degli Studi di MilanoCrema (CR)Italy
DAVID SAMYDEIntel CorporationSanta Clara, CAUSA
SUDEEP SARKAR
Computer Science and EngineeringUniversity of South FloridaTampa, FLUSA
ROBERTO SASSIDepartment of Information TechnologiesUniversit degli Studi di MilanoCrema (CR)Italy
-
8/12/2019 A Front
35/40
List of Contributors xxxv
BRUCE SCHNEIERBTLondonUK
BERRY SCHOENMAKERSDepartment of Mathematics and Computer ScienceTechnische Universiteit EindhovenEindhovenThe Netherlands
MATTHIAS SCHUNTERIBM Research-ZurichRschlikonSwitzerland
JRG SCHWENKHorst Grtz Institute for IT SecurityRuhr University BochumBochumGermany
EDWARD SCIOREComputer Science DepartmentBoston CollegeChestnut Hill, MAUSA
FABIO SCOTTIDipartimento di Tecnologie dellInformazioneUniversit degli Studi di MilanoCrema (CR)Italy
NICOLAS SENDRIERProject-Team SECRETINRIA Paris-RocquencourtLe Chesnay
France
EHAB AL- SHAERCyber Defense and Network Assurability (CyberDNA)CenterDepartment of Software and Information SystemsCollege of Computing and InformaticsUniversity of North Carolina CharlotteCharlotte, NCUSA
BASIT SHAFIQCIMICRutgers, The State University of New JerseyNewark, NJUSA
ADI SHAMIRThe Paul and Marlene Borman Professor of AppliedMathematicsWeizmann Institute of ScienceRehovotIsrael
MICAH SHERRDepartment of Computer Science
Georgetown UniversityWashington, DCUSA
IGOR SHPARLINSKIDepartment of Computing Faculty of ScienceMacquarie UniversityAustralia
ROBERT SILVERMANChelmsford, MAUSA
RICHARD T. SIMONHarvard Medical SchoolCenter for Biomedical InformaticsCambridge, MAUSA
GREG SINCLAIRThe Volgenau School of Engineeringand ITCentre for Secure Information SystemsGeorge Mason UniversityFairfax, VAUSA
GAUTAM SINGARAJUThe Volgenau School of Engineeringand ITGeorge Mason University Ask.com
-
8/12/2019 A Front
36/40
xxxvi List of Contributors
RADU SIONNetwork Security and Applied Cryptography LabDepartment of Computer ScienceStony Brook UniversityStony Brook, NY
USA
BEN SMEETSDepartment of Information TechnologyLund UniversityLundSweden
SEAN W. SMITHDepartment of Computer ScienceDartmouth College
Hanover, NHUSA
ALAN D. SMITHDepartment of Management and MarketingRobert Morris UniversityPittsburgh, PAUSA
JEROME A. SOLINASNational Security Agency
Ft Meade, MDUSA
ANURAG SRIVASTAVADepartment of Applied Information Technology andCentre for Secure Information SystemsThe Volgenau School of EngineeringGeorge Mason UniversityFairfax, VAUSA
MUDHAKAR SRIVATSAIBM Research DivisionThomas J. Watson Research CenterYorktown Heights, NYUSA
WILLIAM STALLINGSWilliamStallings.comBrewster, MAUSA
FRANOIS-XAVIER STANDAERTMicroelectronics LaboratoryUniversit Catholique de LouvainLouvain-la-NeuveBelgium
ANGELOS STAVROUComputer Science DepartmentSchool Information Technology and EngineeringGeorge Mason UniversityFairfax, VAUSA
GRAHAM STEELLaboratoire Specification et VerificationINRIA, CNRS & ENS
CachanFrance
MARK STEPHENSSMU HACNet LabsSchool of EngineeringSouthern Methodist UniversityNacogdoches, TXUSA
ANTON STIGLICInstant LogicCanada
ALEX STOIANOVInformation and Privacy Commissioners Office ofOntarioToronto, ONCanada
SALVATORE J. STOLFO
Department of Computer ScienceColumbia UniversityNew York, NYUSA
SCOTT D. STOLLERDepartment of Computer ScienceStony Brook UniversityStony Brook, NYUSA
-
8/12/2019 A Front
37/40
List of Contributors xxxvii
NARY SUBRAMANIANDepartment of Computer ScienceThe University of Texas at TylerTyler, TXUSA
KUN SUNIntelligent Automation, Inc.Rockville, MDUSA
BERK SUNARDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA
LAURENT SUSTEKInside Secure FranceAtmelFrance
ANDREW BENG JIN TEOHSchool of Electrical and Electronic EngineeringYonsei UniversitySeodaemun-gu, Seoul
Korea
EDLYN TESKEDepartment of Combinatorics and OptimizationUniversity of WaterlooWaterloo, OntarioCanada
NICOLAS THRIAULTDepartamento de MatemticaUniversidad del Bo-Bo
TalcaChile
ACHINT THOMASCenter for Unified Biometrics and Sensors (CUBS)Department of Computer Science and EngineeringUniversity at Buffalo (SUNY Buffalo), The StateUniversity of New YorkAmherst, NYUSA
EMMANUEL THOMEINRIA Lorraine Campus ScientifiqueVILLERS-LS-NANCY CEDEXFrance
MITCHELL A. THORNTONDepartment of Computer Science and EngineeringDepartment of Electrical EngineeringLyle School of EngineeringSouthern Methodist UniversityDallas, TXUSA
MEHDI TIBOUCHILaboratoire dinformatique de lENS
cole normale suprieureParisFrance
KAR-ANN TOHSchool of Electrical and Electronic EngineeringYonsei UniversitySeodaemun-gu, SeoulKorea
ASSIA TRIACEA-LETIFrance
ERAN TROMERComputer Science and Artificial Intelligence LaboratoryMassachusetts Institute of TechnologyCambridge, MAUSA
SEAN TURNERIECA, Inc.Fairfax, VAUSA
SHAMBHU UPADHYAYADepartment of Computer Science and EngineeringUniversity at Buffalo The State University of New YorkBuffalo, NYUSA
-
8/12/2019 A Front
38/40
xxxvii i Listof Contributors
SALIL VADHANSchool of Engineering & Applied SciencesHarvard UniversityCambridge, MAUSA
JAIDEEP VAIDYADepartment of Management Science and InformationSystems, CIMICRutgers, The State University of New JerseyNewark, NJUSA
HENK C. A. VANTILBORGDepartment of Mathematics and Computing ScienceEindhoven University of TechnologyEindhovenThe Netherlands
MAYANKVARIAComputer Science and Artificial Intelligence Laboratory(CSAIL)Massachusetts Institute of TechnologyCambridge, MAUSA
MARC VAUCLAIRBU Identification, Center of Competence SystemsSecurityNXP SemiconductorsLeuvenBelgium
HELMUT VEITHInstitute of Information SystemsTechnische Universitt WienWienAustria
V. N. VENKATAKRISHNANDepartment of Computer ScienceUniversity of Illinois at ChicagoChicago, ILUSA
CHRISTIAN VIARD-GAUDINPolytech NantesUniversit de Nantes, IRCCyNNantesFrance
MARION VIDEAUUniversit Henri Poincar, Nancy /LORIA and ANSSIParisFrance
B. V. K. VIJAYA KUMARDepartment of Electrical and Computer EngineeringCarnegie Mellon UniversityPittsburgh, PA
USA
DAN WALLACHDepartment of Computer ScienceRice UniversityHouston, TXUSA
COLIN D. WALTERInformation Security Group
Royal Holloway University of LondonSurreyUK
XIAOFENG WANGSchool of Informatics and ComputingIndiana University at BloomingtonBloomington, INUSA
MICHAEL WARDProduct Security Chip Centre of ExcellenceMasterCard WorldwideWaterlooBelgium
NICHOLAS C. WEAVERInternational Computer Science InstituteBerkeley, CAUSA
-
8/12/2019 A Front
39/40
-
8/12/2019 A Front
40/40
xl List of Contributors
BULENT YENERDepartment of Computer ScienceRensselaer Polytechnic InstituteTroy, NYUSA
SACHIKOYOSHIHAMAIBM Research-TokyoYamato, KanagawaJapan
SHUCHENG YUDepartment of Electrical and Computer EngineeringWorcester Polytechnic InstituteWorcester, MAUSA
FENG YUESchool of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina
WENSHENG ZHANGDepartment of Computer ScienceCollege of Liberal Arts and SciencesIowa State UniversityAmes, IAUSA
DAVID ZHANGBiometrics Research Centre, Department of ComputingThe Hong Kong Polytechnic UniversityHung Hom, KowloonHong Kong
SENCUN ZHUDepartment of Computer Science and EngineeringPennsylvania State UniversityUniversity Park, PAUSA
ZHICHAO ZHUDepartment of Computer Science and EngineeringThe Pennsylvania State UniversityUniversity Park, PAUSA
PAUL ZIMMERMANNTeam Caramel, Btiment ALORIA/INRIA
Villers-ls-Nancy CedexFrance
ROBERT ZUCCHERATO Carle CrescentOntarioCanada
WANGMENG ZUOSchool of Computer Science and TechnologyHarbin Institute of TechnologyHarbinChina
MARY ELLEN ZURKOIBM Software Group Lotus Live Security Architectureand StrategyWestford, MAUSA