Top Encryption Experts
Search thousands of experts from around the world.
Associate Professor, Computer Science · New Jersey Institute of Technology
Professor Rohloff focuses on encrypted computing, homomorphic encryption, lattice-based and applied cryptography, and cybersecurity
Chair, Security Systems and Law Enforcement Technology Department · Farmingdale State College
Dr. Islam is Chair of the Security Systems and Law Enforcement Technology Department, and a member of the Protect New York think tank.
Associate Professor of Business Law and Ethics · Indiana University, Kelley School of Business
Anjanette Raymond is an Associate Professor at the Kelley School of Business and an Adjunct Associate Professor of Law at Maurer Law School.
Board of Trustees Distinguished Professor · University of Connecticut
A professor of electrical and computer engineering, Javidi also leads the Multidimensional Optical Sensing and Imaging Systems (MOSIS) Lab.
PALMER CHAIR IN TELECOMMUNICATIONS, Telecommunications · Pennsylvania State University
Meinrath is a renowned technology policy expert and is internationally recognized for his work as a social entrepreneur and angel investor
Canada Research Chair in Linguistic Information Visualization, and Associate Professor, Faculty of Science · University of Ontario Institute of Technology
Expert in managing linguistic data and understanding its importance to Canada
Lecturer in Systems Engineering and Computer Science · Loyola Marymount University
Frank R. Seaver College of Science and Engineering
Lawrence M. Slifkin Distinguished Professor, Department of Computer Science, College of Arts and Sciences · UNC-Chapel Hill
Dr. Reiter's research interests include all areas of computer and communications security and distributed computing.
Associate Professor · VCU College of Engineering
Professor Bulut's research interests include wireless networks and mobile computing, cyber-physical systems, and social networks
Mobile Computing: Wireless Networks Cyber-physical Systems Mobile Social Networks Wireless Charging Security: Cyber Security Network Security Privacy and Trust Mobile (3G/4G) Systems: Mobile Packet Core Cloud Mobile Data Offloading Big Data: Internet of Things (IoT) Crowd-sensing Mobile Data Mining and Supervised Learning
Director of the Master of Public Administration Program · Southern Utah University
Specializing in experiential learning, fund-raising, and grant writing in higher education