Properties (58)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Person
|
gptkbp:academicAdvisor |
gptkb:David_R._Stinson
|
gptkbp:almaMater |
gptkb:University_of_California,_Berkeley
|
gptkbp:awards |
Fellow of the IEEE
Fellow_of_the_ACM |
gptkbp:birthPlace |
gptkb:Hong_Kong
|
gptkbp:collaborations |
gptkb:H._(Heng)_Wang
gptkb:Y._C._(Yuan-Cheng)_Chen gptkb:S._(Sheng)_Zhang gptkb:M._A._(Tony)_K._K._Wong |
gptkbp:contribution |
Information Security
Distributed Systems Network Protocols Cryptographic Protocols |
gptkbp:field |
Computer Science
|
https://www.w3.org/2000/01/rdf-schema#label |
Simon Lam
|
gptkbp:influencedBy |
gptkb:Ron_Rivest
gptkb:Martin_Hellman gptkb:Whitfield_Diffie Adrian_Thacker |
gptkbp:knownFor |
Cryptography
|
gptkbp:notableWork |
Secure Communication
|
gptkbp:publications |
gptkb:Security_Operations_Center
gptkb:Intrusion_Detection_Systems gptkb:Digital_Forensics Data Privacy Vulnerability Assessment Incident Management Security Auditing Cloud Security Secure Data Sharing Penetration Testing Ethical Hacking IoT Security Incident Response Planning Secure Multi-Party Computation Security Frameworks Cyber Threat Intelligence Malware Analysis Security Metrics Network Forensics Security Architecture Secure Software Development Blockchain Security A Survey of Network Security Security Policies and Compliance Cryptographic Protocols for Secure Communication Secure Routing Protocols Cybersecurity_Education Artificial_Intelligence_in_Cybersecurity Key_Management_in_Wireless_Networks Machine_Learning_for_Security Privacy_in_Networked_Systems Risk_Management_in_Cybersecurity Security_in_Ad_Hoc_Networks Trust_Management_in_Networks |
gptkbp:researchInterest |
Network Security
|
gptkbp:work |
gptkb:University_of_Texas_at_Austin
|