Paul Kocher designed the cryptographic elements of SSL3 back in the mid-1990s,
while still an undergraduate at Stanford, thereby gaining him an international reputation for allowing
secure Internet transactions.
The longevity of SSL3 is a testament to his brilliance, as is the fact that he is entirely
self-taught in cryptography.
Vinton G. Cerf
VP & Chief Internet Evangelist - Google
Vinton G. Cerf is vice president and Chief Internet Evangelist for Google. He contributes to
global policy development and continued spread of the Internet.
Widely known as one of the "Fathers of the Internet," Cerf is the co-designer of the
TCP/IP protocols and the architecture of the Internet.
Philip R. Zimmermann
Creator of Pretty Good Privacy (PGP)
Philip R. Zimmermann is the creator of Pretty Good Privacy (PGP), the most widely used email
encryption software in the world. He is also known for his work in VOIP encryption protocols,
notably ZRTP and Zfone.
Steven M. Bellovin
Professor of Computer Science - Columbia University
Steven M. Bellovin is a professor of computer science at Columbia University, where he does research
on networks, security, and especially why the two don't get along, as well as related public policy
Bellovin is the co-author of Firewalls and Internet Security: Repelling the Wily Hacker, and holds a
number of patents on cryptographic and network protocols.
Richard Alan Clarke
Served as Special Advisor to the President on cyber security
Richard Alan Clarke is the former National Coordinator for Security, Infrastructure Protection,
and Counter-terrorism for the United States. Under President George W. Bush, he served as the
Special Advisor to the President on cyber security.
Mr. Clarke developed and found sponsorship for legislation which created the Cyber Corps and lead
the development of the first National Plan for Cyber Security.
David E. Bell
Co-author of the Bell-La La Padula model of computer security
Dr. Bell was the co-author of the Bell-La La Padula model of computer security (with Leonard J. La Padula).
The model became the most widely used security model in the development of trusted (secure) computer systems.
His two papers “Lattices, Policies and Implementations” and “Putting Policy Commonalities
to Work” showed not only that any Boolean policy could be supported by any Boolean-policy implementation,
but also that every “different” security policy in the literature was a Boolean security policy, and
hence supportable by any Boolean implementation.
Jim Bidzos is CEO and Chairman of VeriSign, Inc
He served as CEO of RSA Data Security from 1986 through 1999. Along with RSA co-founder and MIT professor
Ron Rivest, Bidzos built RSA into the premier cryptography company in the 80s and 90s.
Bidzos formed Verisign in 1995 to provide trusted certificate authority services to a global market
after pioneering the concept within RSA beginning in 1986.He also created the RSA Conference in 1991,
and was the Chairman of the event until his retirement from that position in 2004.
Eugene H. Spafford
Professor of CS @ Purdue University
Eugene H. Spafford is one of the most recognized leaders in the field of computing.
Dr. Eugene Spafford is a professor with an appointment in Computer Science at Purdue University,
where he has been a member of the faculty since 1987.
He is a senior advisor and consultant on issues of security
and intelligence, education, and policy to a number of major companies, academic and government agencies,
including Microsoft, Intel, Unisys, the US Air Force, the NSA, the GAO, the FBI, the NSF, the DoJ, the DoE,
and two Presidents of the United States.
Started the study of intrusion detection and "THE BRAIN TRUST"
The late James Anderson effectively started the field of intrusion detection, invented the
concept of the reference monitor, made some very significant but classified contributions to
counterintelligence, and organized some of the first cyber penetration teams, including a well-known
group at CIA named "The Brain Trust".
Mr. Anderson originated the idea of contaminated media and loading an altered OS, the "2 card loader"
issue, whose intellectual successor is such things as Stuxnet, APTs, and arguably was the first computer
virus. In 1990, Mr. Anderson was one of the first recipients of the National Computer Systems Security Award.
Willis H. Ware
Computer Scientist emeritus at RAND Corporation
The late Willis H. Ware (Ph.D., Princeton University, 1951) was a senior computer scientist emeritus with
the RAND Corporation. An electrical engineer, he devoted his career to hardware, software, architectures,
software development, networks, federal agency and military applications, management of
computer-intensive projects, public policy and legislation.
Dr. Ware was a member of the NAE, a Fellow of the IEEE, AAAS,and ACM.
He received the U.S. Air Force Exceptional Civilian Service Medal (1979), the IEEE Centennial Medal (1984),
the National Computer System Security Award (1989), and the IEEE Computer Pioneer Award (1993).
F. Lynn McNulty
An early champion of Information Security in the Government
F. Lynn McNulty, an early champion of information security in the government, passed away on June 4.
McNulty, whom Federal Computer Week identified as one of the key thought leaders of the past 25 years in a
feature package that will appear in the June 15 issue, spent 30 years in the government.
Over the span of his federal career he served as the State Department’s first director of information
systems security; as security program manager at the Federal Aviation Administration; and as associate
director for computer security at the National Institute of Standards and Technology.
Professor Emeritus - Stanford University
Professor Hellman is best known for his invention, with Diffie and Merkle,
of public key cryptography.
In addition to many other uses, this technology forms the basis for secure transactions on the Internet.
He has also been a long-time contributor to the computer privacy debate, starting with the issue of DES
key size in 1975 and culminating with service (1994-96) on the National Research Council's Committee to
Study National Cryptographic Policy, whose main recommendations have since been implemented.
Developed earliest public key cryptography system with Diffie and Hellman
Merkle developed the world's earliest public key cryptographic system. Their insight underpins secure
transactions on the Internet, enabling e-commerce and a host of other interactions in which secure electronic
communications are required.
Since 1988, Merkle has been researching nanotechnology and, in 2003, became a distinguished professor at
Georgia Tech before returning to California in 2006.He has been awarded the RSA Award in Mathematics (2000)
and the IEEE Richard W. Hamming Medal (2010).
Developed the world's earliest public key cryptographic system along with
Merkle and Hellman
Diffie and Hellman worked together throughout 1975 and were joined by Ralph Merkle in 1976.
The results of their work appeared in Diffie and Hellman's paper, New Directions in Cryptography,
in November 1976. The insights in this paper underpin secure transactions on the Internet,
enabling e-commerce and a host of other interactions in which secure electronic communications are required.
In 1992, Diffie was awarded an honorary doctorate by the Swiss Federal Institute of Technology in Zurich, and
in 2010, shared the IEEE Richard W. Hamming Medal with Ralph Merkle and Martin Hellman.
Dorothy Denning is recognized as one of the world's leading experts in information security.
She is currently a Distinguished Professor in the Department of Defense Analysis at the Naval Postgraduate
Monterey, CA, and is one of the faculty associated with the Center on Terrorism and Irregular Warfare
and with the Center for Information Systems Security Studies and Research.
Dr. Denning has published 150 articles and four books, her most recent being Information Warfare and Security.
She has been named to the ISSA Hall of Fame (2003), awarded the CSO COMPASS award (2003),
named as both a CISSP and as a CISM honoris causa, and elected as a Fellow of the ACM (1995).
President of ESec, providing platforms for secure,
reliable e-business on the Internet
Dr. Schell was co-founder and Vice President for Engineering of Gemini Computers, Inc.,
where he directed development of Gemini's Class A1 network processor commercial product.
He was also the founding Deputy Director of the (now) National Computer Security Center.
Previously he was an Associate Professor of Computer Science at the Naval Postgraduate School.
He has been referred to as the "father" of the Trusted Computer System Evaluation Criteria (the "Orange Book").
The NIST and NSA have recognized Dr. Schell with the National Computer System Security Award.
SRI Computer Science Lab since September 1971
In the Computer Science Laboratory at SRI he led the Provably Secure Operating System (PSOS) project,
under which the SRI Hierarchical Development Methodology (HDM) was created.
Dr. Neumann’s main research interests continue to involve security, crypto applications, overall system
survivability, reliability, fault tolerance, safety, software-engineering methodology, systems in the large,
applications of formal methods, and risk avoidance. He has written numerous papers, given many talks,
and has provided testimony before government hearings. He recently published a book Computer Related Risks
(ACM Press, 1995).
Lead Research Scientist - CSPRI at George Washington University
Dr. Landwehr is a noted expert in trustworthy computing, including high assurance software development,
understanding software flaws and vulnerabilities, token-based authentication, system evaluation and
certification methods, multilevel security, and architectures for intrusion tolerant systems
He has been a leader in cybersecurity research, having led cybersecurity programs at the National Science
Foundation from 2001-2004 and 2009-2011, overseeing the disbursement of more than $110M of grants,
and having served as a division chief at IARPA from 2005-2009.
Professor of Computer Science at MIT's EECS Department
He is the Andrew and Erna Viterbi Professor of Computer Science at MIT's Department of Electrical Engineering
and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intelligence Laboratory
Rivest is a member of the National Academy of Engineering, the National Academy of Sciences,
and is a Fellow of the Association for Computing Machinery, the International Association for
Cryptologic Research, and the American Academy of Arts and Sciences
Faculty of Mathematics and Computer Science at the Weizmann Institute
. He is a co-inventor of the RSA algorithm (with Ron Rivest and Len Adleman),
a co-inventor of the Feige–Fiat–Shamir identification scheme (with Uriel Feige and Amos Fiat),
one of the inventors of differential cryptanalysis and has made numerous contributions to the fields
of cryptography and computer science
In addition to RSA, Shamir's other numerous inventions and contributions to cryptography include the
Shamir secret sharing scheme, the breaking of the Merkle-Hellman knapsack cryptosystem, visual cryptography,
and the TWIRL and TWINKLE factoring devices.
Shamir has also made contributions to computer science outside of cryptography, such as finding the first
linear time algorithm for 2-satisfiability and showing the equivalence of the complexity classes PSPACE and IP.
Theoretical computer scientist and Prof. of CS and Mol.Biol. at the USC.
He is known for being a co-inventor of the RSA (Rivest-Shamir-Adleman) cryptosystem in 1977, and of DNA
computing. RSA is in widespread use in security applications, including https.
For his contribution to the invention of the RSA cryptosystem, Adleman, along with Ron Rivest and Adi Shamir,
has been a recipient of the 1996 Paris Kanellakis Theory and Practice Award and the 2002 ACM Turing Award,
often called the Nobel Prize of Computer Science. He is one of the original discoverers of the
Adleman-Pomerance-Rumely primality test. Fred Cohen, in his 1984 paper, Experiments with Computer Viruses has
credited Adleman with coining the term "virus".