Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Melissa ChaseMicrosoft ResearchEmail verificata su microsoft.com
- Roberto TamassiaPlastech Professor of Computer Science, Brown UniversityEmail verificata su cs.brown.edu
- Saeed MahloujifarFAIR, MetaEmail verificata su meta.com
- Dimitrios PapadopoulosHong Kong University of Science and TechnologyEmail verificata su cse.ust.hk
- Fahad PanolanSchool of Computing, University of LeedsEmail verificata su leeds.ac.uk
- Ashutosh RaiDepartment of Mathematics, IIT DelhiEmail verificata su maths.iitd.ac.in
- Ramanujan M. S.University of Warwick, UKEmail verificata su warwick.ac.uk
- Sudeshna KolayIIT KharagpurEmail verificata su cse.iitkgp.ac.in
- Pranabendu MisraAssistant Professor at Chennai Mathematical InstituteEmail verificata su cmi.ac.in
- Nikos TriandopoulosBoston UniversityEmail verificata su cs.bu.edu
- Cédric FournetMicrosoft ResearchEmail verificata su microsoft.com
- Bryan ParnoCarnegie Mellon UniversityEmail verificata su cmu.edu
- Dario FioreAssociate Research Professor, IMDEA Software InstituteEmail verificata su imdea.org
- Markulf KohlweissUniveristy of EdinburghEmail verificata su ed.ac.uk
- Michael T. GoodrichProfessor of Computer Science, University of California, IrvineEmail verificata su uci.edu
- Angelo De CaroIBM Research - ZurichEmail verificata su zurich.ibm.com
- Jan CamenischDFINITYEmail verificata su dfinity.org
- C.Pandu RanganProfessor, Department of Computer Science and Engg, IIT-Madras, India.Email verificata su cse.iitm.ac.in
- Björn TackmannDFINITYEmail verificata su dfinity.org
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupEmail verificata su inf.unibe.ch