Taehwan Choi, Weak and Strong Authentication Protocols in Computer Networks, December 2012; Member of Technical Staff, VMware, Palo Alto, California.
Hrishikesh B. Acharya, On the Modular Verification and Design of Firewalls, August 2012; Assistant Professor, Indraprastha Institute of Information Technology, Delhi, India.
Yan Li, Reliability and Security of Vector Routing Protocols, May 2011; Member of Technical Staff, Oracle, Redwood City, California.
Young-ri Choi, Design and Analysis of Self-Stabilizing Sensor Network Protocols, June 2007; Assitant Professor, Ulsan National Institute of Science and Technology (UNIST), Ulsan, South Korea.
Alex Liu, A Theory for the Design and Analysis of Firewalls, June 2006; Associate Professor, Michigan State University, East Lansing, Michigan.
Eunjin Jung, Dispersal and Vulnerability Analysis of Certificate Systems, June 2006; Assistant Professor University of San Francisco, San Francisco, Cakifornia.
Douglas H. Steves, Contract in Electronic Commerce, December 2005, IBM, Austin, Texas.
Tommy M. McGuire, Correct Implementation of Network Protocols, May 2004, IBM Research, Austin, Texas.
Chin-Tser Huang, Hop Integrity: A Defense Against Denial-of-Service Attacks, August 2003; Associate Professor, The University of South Carolina, Columbia, South Carolina.
F. Furman Haddix, Alternating Parallelism and the Stabilization of Distributed Systems, May 1999; Associate Professor, Texas State University, San Marcos.
Marco Schneider, Flow Routing in Computer Networks, May 1997; Technology Resources Inc, AT&T, Austin, Texas.
Amal Elnahas, Flow Scheduling Protocols in High-Speed Networks, December 1996; Professor, German University in Cairo, Egypt.
Jorge A. Cobb, Flow Theory and the Analysis of Real-Time Protocols, May 1996; Associate Professor, The University of Texas at Dallas.
Sarah E. Chodrow, The Sentry System: Observing Concurrent Programs in Execution, August 1994; Lead System Architect, ThinkSmart Performance System, LLC, Atlanta, Georgia.
Anish Arora, A Foundation for Fault-Tolerant Computing, August 1992; Professor, The Ohio State University.
Ted Herman, Adaptive Programming, August 1991; Associate Professor, University of Iowa.
James H. Anderson, Atomicity of Concurrent Programs, August 1990; Professor, University of North Carolina at Chapel Hill.
Ambuj K. Singh, Ranking in Distributed Systems, September 1989; Professor, The University of California at Santa Barbara.
Nicholas J. Multari, Towards a Theory for Self-Stabilizing Protocols, June 1989; Major in the Air Force.
Chung K. Chang, Bedding and the Reliability of Distributed Systems, July 1987; Associate Professor, Indiana University.
Devendra Kumar, Efficient Algorithms for Distributed Simulation and Related Problems, December 1986; Associate Professor, City University of New York, City College.
Ching H. Chow, A Discipline for Verification and Modular Construction of Communication Protocols, November 1985; Professor, University of Colorado at Colorado Springs.
Hai Y. Hwang, Database Integration and Query Optimization in Multi-database Systems, October 1984; Bell Labs, Murray Hill, New Jersey.
Yao T. Yu, Communicating Finite State Machines: Analysis and Synthesis of Communication Protocols, January 1983; Bell Labs, Murray Hill, New Jersey.
Vincent Fernandes, Transactions + Processes = Distributed Systems, December 1982; Microsoft, Redmond, Washington.
Aditya Joshi, Modularizing Firewalls Using CUDA enabled GPUs, August 2010; Software Engineer, Microsoft, Redmond, Washington.
Suhasini H. Ranganathan, An Anti-Replay protocol for Indefinite Security Associations in IPsec, August 2008. Currently at an IT company in Buffalo, NY
Vasanth Elavarasan, Email Filters that use Spammy Words Only, May 2006, Currently at IBM in Houston, Texas.
Nancy Li, Parameterized Firewall Templates: A New Approach to Firewall Design, May 2005, Currently at IBM in Austin, Texas.
Aashin Gautam, Stamping Out Spam, May 2004, Currently at National Instruments in Austin, Texas.
Lydia Miller, Security of the Grid Routing Protocol, December 2003; Currently at IBM in Austin, Texas.
Dhiraj Bhagchandka, Classification of Firewalls and Proxies, August 2003; Currently Ph.D. student at Stanford University.
Muqtadar Ahmed, Specification and Analysis of the Anonymity Ring, December 2002; Currently in Austin, Texas.
Mohammad A. Alam, Secure Passwords in the Internet, December 2002; Currently a Master student at University of Texas at Austin.
Lok-Man (Raymond) Leung, The Secure Password Protocol, December 2002; Currently a Master student at Cornell University.
Chun He, Analysis of Packet-Marking Protocols, May 2002; Currently at IBM in Austin, Texas.
Delwin Lee, Specification and Verification of Digital Cash Protocols, May 2002; Currently at Microsoft, Redmond, Washington.
Pericles Leng Cheng, Scheduling and Security for the Hypertext Transfer Protocol, May 2001; Received a Master’s degree from the University of Texas at Austin andreturned to Cyprus.
Eric Li, Anti-Replay Window Protocols for Secure IP, December 1999; currently working for Windows Operating Systems Division in Microsoft, Redmond, Washington.
Lok Yan Leung, Specification and Verification of the MicroMint Protocol, December 1998; currently working for IBM Research, Austin, Texas.
Ali Lakhia, Specification and Verification of the Payword Protocols, August 1998; currently a Ph.D student in University of California at Berkeley.