Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- John SteinbergerTsinghua University, BeijingEmail verificata su tsinghua.edu.cn
- Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Seongkwang KimSenior Engineer in Samsung SDSEmail verificata su samsung.com
- Martijn StamSenior Researcher at Simula UiB, NorwayEmail verificata su simula.no
- Je Hong ParkElectronics and Telecommunications Research InstituteEmail verificata su nsr.re.kr
- Jihoon ChoHead of Security Resarch Center in Samsung SDSEmail verificata su samsung.com
- Wonseok ChoiPostdoc, Purdue UniversityEmail verificata su purdue.edu
- Yannick SeurinCryptographer at LedgerEmail verificata su ledger.com
- Joohee LeeAssistant Professor, Sungshin Women's UniversityEmail verificata su sungshin.ac.kr
- Mincheol SonKAISTEmail verificata su kaist.ac.kr
- Yongjin YeomProfessor of Mathematics, Kookmin UniversityEmail verificata su kookmin.ac.kr
- Shan ChenSouthern University of Science and Technology (SUSTech)Email verificata su sustech.edu.cn
- Aaram YunEmail verificata su ewha.ac.kr
- Bart MenninkDigital Security Group, Radboud University, NijmegenEmail verificata su cs.ru.nl
- Yevgeniy DodisProfessor, New York UniversityEmail verificata su cs.nyu.edu
- Jonathan KatzProfessor of Computer Science, University of MarylandEmail verificata su cs.umd.edu
- Stefano TessaroUniversity of WashingtonEmail verificata su cs.washington.edu
- Peter GažiIOG ResearchEmail verificata su iohk.io
- Atul LuykxGoogleEmail verificata su google.com
- Radha PoovendranProfessor of Electrical and Computer Engineering, University of Washington, SeattleEmail verificata su uw.edu