![Head shot image of Foteini Baldimtsi](/media/uploads/people/.thumbnails/foteini18.jpg/foteini18-100x150.jpg)
Cryptography, Security, Electronic Cash, Data Privacy
![Head shot image of Dov Gordon](/media/uploads/people/.thumbnails/dgordon.jpg/dgordon-100x150.jpg)
Cryptography, Theoretical Computation, Game Theory
![Head shot image of Fei Li](/media/uploads/people/.thumbnails/fei_li.jpg/fei_li-100x150.jpg)
Online Algorithms, Approximation Algorithms, Network Algorithms
![Head shot image of Jyh-Ming Lien](/media/uploads/people/.thumbnails/jyh-ming_lien.jpg/jyh-ming_lien-100x150.jpg)
Computational Geometry, Multiagent Systems, Motion Planning
![Head shot image of Dana Richards](/media/uploads/people/.thumbnails/dana_richards.jpg/dana_richards-100x150.jpg)
Steiner Tree Algorithms, Information Dissemination in Networks, Parallel Algorithms
![Head shot image of Duminda Wijesekera](/media/uploads/people/.thumbnails/duminda_wijesekera.jpg/duminda_wijesekera-100x150.jpg)
Cybersecurity, Networks, Control and Signalling, Logic