Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tsz Hon YuenMonash UniversityEmail verificata su monash.edu
- Siu-Ming YiuProfessor of Computer Science, The University of Hong KongEmail verificata su cs.hku.hk
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- David CashUniversity of ChicagoEmail verificata su cs.uchicago.edu
- Mark ZhandryNTT ResearchEmail verificata su princeton.edu
- Adam O'NeillUniversity of Massachusetts AmherstEmail verificata su cs.umass.edu
- Hong-Sheng ZhouVirginia Commonwealth UniversityEmail verificata su vcu.edu
- Pengfei SunSenior Research Scientist, Shape SecurityEmail verificata su rutgers.edu
- Feng-Hao LiuWashington State UniversityEmail verificata su wsu.edu
- Liang GuYale UniversityEmail verificata su yale.edu
- Anbang RuanDepartment of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Xiuhua WangHuazhong University of Science and TechnologyEmail verificata su hust.edu.cn
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Charalampos PapamanthouYale UniversityEmail verificata su yale.edu