Crea il mio profilo
Accesso pubblico
Visualizza tutto49 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sanjam GargUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Giulio MalavoltaBocconi UniversityEmail verificata su unibocconi.it
- Jörn Müller-QuadeProfessor für Informatik, Karlsruhe Institute of TechnologyEmail verificata su kit.edu
- Zvika BrakerskiWeizmann Institute of ScienceEmail verificata su weizmann.ac.il
- Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergEmail verificata su fau.de
- Sihang PuCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Lucjan HanzlikCISPA, Saarland University, Saarland Informatics CampusEmail verificata su cispa.saarland
- Bernardo MagriThe University of ManchesterEmail verificata su manchester.ac.uk
- Anderson C. A. NascimentoHead of Security Research - VisaEmail verificata su visa.com
- Daniel MasnyMetaEmail verificata su fb.com
- Peihan MiaoBrown UniversityEmail verificata su brown.edu
- Divya GuptaPrincipal Researcher, Microsoft Research IndiaEmail verificata su microsoft.com
- Tamer MourBocconi UniversityEmail verificata su weizmann.ac.il
- Pratyay MukherjeeSupra ResearchEmail verificata su supraoracles.com
- Maciej ObremskiNational University of SingaporeEmail verificata su nus.edu.sg
- Rafael DowsleyMonash UniversityEmail verificata su monash.edu
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland