2008 - Fellow of Alfred P. Sloan Foundation
His primary areas of investigation include Computer security, Cryptography, The Internet, Anonymity and Computer network. His Computer security study frequently links to other fields, such as Ubiquitous computing. His Ubiquitous computing research is multidisciplinary, incorporating perspectives in Patient safety, Communications protocol, Software-defined radio, Software and Occupational safety and health.
Tadayoshi Kohno interconnects Hash table, Embedded system and Internet privacy in the investigation of issues within Cryptography. His research integrates issues of Firewall, Multimedia and Honeypot in his study of The Internet. His study in Anonymity is interdisciplinary in nature, drawing from both Consistency and Random oracle, Encryption, Public-key cryptography.
Tadayoshi Kohno mainly focuses on Computer security, Internet privacy, Cryptography, Encryption and Computer network. His Computer security research is multidisciplinary, relying on both Wireless and Cloud computing security. In general Internet privacy study, his work on Information privacy often relates to the realm of Work and Contact tracing, thereby connecting several areas of interest.
Cryptography connects with themes related to Embedded system in his study. Hash function is closely connected to Theoretical computer science in his research, which is encompassed under the umbrella topic of Encryption. In his research, Cryptographic protocol and SSH File Transfer Protocol is intimately related to Secure Shell, which falls under the overarching field of Authenticated encryption.
Tadayoshi Kohno mostly deals with Internet privacy, Computer security, Artificial intelligence, Adversarial system and Augmented reality. His Internet privacy study combines topics from a wide range of disciplines, such as Online advertising and The Internet. Computer security is closely attributed to Best practice in his research.
His work on Deep learning as part of general Artificial intelligence study is frequently connected to Stop sign, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. His work deals with themes such as Information leakage and World Wide Web, which intersect with Adversarial system. His Augmented reality research includes elements of Immersion, Multi-user and Key.
Artificial intelligence, Adversarial system, Internet privacy, Machine learning and Deep learning are his primary areas of study. His Artificial intelligence study frequently links to related topics such as Detector. His studies in Detector integrate themes in fields like Object and Computer vision.
His Adversarial system research incorporates elements of Information sensitivity, Information leakage, Robustness and Big data. Tadayoshi Kohno combines subjects such as World Wide Web and Web content with his study of Internet privacy. Machine learning is closely attributed to Classifier in his study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Experimental Security Analysis of a Modern Automobile
Karl Koscher;Alexei Czeskis;Franziska Roesner;Shwetak Patel.
ieee symposium on security and privacy (2010)
Comprehensive experimental analyses of automotive attack surfaces
Stephen Checkoway;Damon McCoy;Brian Kantor;Danny Anderson.
usenix security symposium (2011)
Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
Michel Abdalla;Mihir Bellare;Dario Catalano;Eike Kiltz.
Journal of Cryptology (2008)
Robust Physical-World Attacks on Deep Learning Visual Classification
Kevin Eykholt;Ivan Evtimov;Earlence Fernandes;Bo Li.
computer vision and pattern recognition (2018)
Remote physical device fingerprinting
T. Kohno;A. Broido;K.C. Claffy.
IEEE Transactions on Dependable and Secure Computing (2005)
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
D. Halperin;T.S. Heydt-Benjamin;B. Ransford;S.S. Clark.
ieee symposium on security and privacy (2008)
Analysis of an electronic voting system
T. Kohno;A. Stubblefield;A.D. Rubin;D.S. Wallach.
ieee symposium on security and privacy (2004)
A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications
Mihir Bellare;Tadayoshi Kohno.
Lecture Notes in Computer Science (2003)
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson;Bruce Schneier;Tadayoshi Kohno.
Robust Physical-World Attacks on Deep Learning Models
Ivan Evtimov;Kevin Eykholt;Earlence Fernandes;Tadayoshi Kohno.
arXiv: Cryptography and Security (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: