Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Bill HornePrincipal Product Manager, AWS CryptographyEmail verificata su amazon.com
- Ilaria LiccardiCSAIL, MITEmail verificata su mit.edu
- Marco Casassa MontPrincipal Cyber Security Consultant & ManagerEmail verificata su bmtglobal.com
- Daniel J. Weitzner3Com Founders Senior Research Scientist, Massachusetts Institute of TechnologyEmail verificata su csail.mit.edu
- Paul LeachAffiliate Professor of Computer Science, University of WashingtonEmail verificata su uw.edu
- Prasad RaoResearch Scientist, LinkedInEmail verificata su linkedin.com
- Sandeep BhattStevens Institute of TechnologyEmail verificata su stevens.edu
- Vijay VaradharajanThe University if NewcastleEmail verificata su newcastle.edu.au
- Jeff HodgesKings Mountain Systems and Google (as of Nov-2018)Email verificata su KingsMountain.com
- Lalana KagalMassachusetts Institute of TechnologyEmail verificata su csail.mit.edu
- Robert TarjanProfessor of Computer Science, Princeton UniversityEmail verificata su cs.princeton.edu
- Stuart HaberStuart Haber Crypto, LLCEmail verificata su acm.org
- Carlisle AdamsSchool of Electrical Engineering and Computer Science, University of OttawaEmail verificata su uottawa.ca