Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- C.Pandu RanganProfessor, Department of Computer Science and Engg, IIT-Madras, India.Email verificata su cse.iitm.ac.in
- Stefan DziembowskiUniversity of Warsaw and IDEAS NCBREmail verificata su mimuw.edu.pl
- Manoj PrabhakaranComputer Science and Engineering, IIT BombayEmail verificata su cse.iitb.ac.in
- Srinivasan RaghuramanVisa ResearchEmail verificata su visa.com
- krzysztof pietrzakProfessor, Cryptography, IST AustriaEmail verificata su ist.ac.at
- Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Goutam PaulAssociate Professor, Cryptology & Security Research Unit (CSRU), Indian Statistical InstituteEmail verificata su ieee.org
- Daniel WichsNortheastern University, Associate ProfessorEmail verificata su ccs.neu.edu
- Harish KarthikeyanJ.P Morgan AI ResearchEmail verificata su jpmchase.com
- Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, AustraliaEmail verificata su ra.ac.ae
- Chaya GaneshIndian Institute of ScienceEmail verificata su iisc.ac.in
- Pratik SarkarSupra ResearchEmail verificata su supraoracles.com
- Michelle X. YeoIST AustriaEmail verificata su uchicago.edu
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyEmail verificata su di.uniroma1.it
- Bernardo MagriThe University of ManchesterEmail verificata su manchester.ac.uk
- Sreenivasa Rao YNIT WarangalEmail verificata su nitw.ac.in
- Kunwar SinghCSE Deapartment, NIT TrichyEmail verificata su nitt.edu
- Mahak PancholiAarhus UniversityEmail verificata su cs.au.dk
- Guillermo Pascual-PerezISTAEmail verificata su ist.ac.at
- Ueli MaurerProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch