Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyEmail verificata su gatech.edu
- Nathan ChenetteRose-Hulman Institute of TechnologyEmail verificata su rose-hulman.edu
- Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Email verificata su ucsd.edu
- George KolliosProfessor of Computer Science, Boston UniversityEmail verificata su bu.edu
- Kobbi NissimDept. of Computer Science (Georgetown)Email verificata su georgetown.edu
- Georgios KellarisLerna Inc.Email verificata su bu.edu
- Younho LeeProfessor, IT Management Division, Department of Data Science, SeoulTechEmail verificata su seoultech.ac.kr
- Craig GentryCTO TripleBlindEmail verificata su tripleblind.ai
- Vincenzo IovinoAragon ZK ResearchEmail verificata su aragon.org
- Angelo De CaroIBM Research - ZurichEmail verificata su zurich.ibm.com
- Dae Hyun YumMyongji UniversityEmail verificata su mju.ac.kr
- Vipul GoyalNTT ResearchEmail verificata su vipulgoyal.org
- Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumEmail verificata su rub.de
- Brent WatersUniversity of Texas at AustinEmail verificata su cs.utexas.edu
- Adam SmithProfessor of Computer Science, Boston UniversityEmail verificata su bu.edu
- Leonid ReyzinProfessor of Computer Science, Boston UniversityEmail verificata su cs.bu.edu
- Mohammad ZaheriDept. of Computer Science, Georgetown UniversityEmail verificata su georgetown.edu
- Serge FehrCWIEmail verificata su cwi.nl
- payman mohasselPrivacy at FacebookEmail verificata su fb.com
- Georgios AmanatidisSchool of Mathematics, Statistics and Actuarial Science; University of EssexEmail verificata su essex.ac.uk