Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Aniket KatePurdue University / Supra ResearchEmail verificata su purdue.edu
- Kartik NayakDuke UniversityEmail verificata su cs.duke.edu
- Nibesh ShresthaSupra LabsEmail verificata su supraoracles.com
- Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergEmail verificata su fau.de
- Bernardo MagriThe University of ManchesterEmail verificata su manchester.ac.uk
- Daniel TschudiConcordiumEmail verificata su concordium.com
- Zhongtang LuoResearch Assistant, Purdue UniversityEmail verificata su purdue.edu
- Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Email verificata su cispa.de
- Giulio MalavoltaBocconi UniversityEmail verificata su unibocconi.it
- Michael ReiterJames B. Duke Distinguished Professor, Duke UniversityEmail verificata su duke.edu
- Akhil BandarupalliPh.D. student in Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityEmail verificata su purdue.edu
- Tiantian GongPurdue UniversityEmail verificata su purdue.edu
- Avishay YanaiVMware ResearchEmail verificata su biu.ac.il
- Ittai AbrahamIntelEmail verificata su cs.huji.ac.il
- Benny applebaumElectrical Engineering School, Tel-Aviv UniversityEmail verificata su post.tau.ac.il
- Benny PinkasBar Ilan University and Aptos LabsEmail verificata su biu.ac.il
- Alin TomescuAptos LabsEmail verificata su alum.mit.edu
- Manish NagarajPurdue UniversityEmail verificata su purdue.edu
- Sri AravindaKrishnan ThyagarajanPostDoc at NTT Research