Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stanislaw JareckiUniversity of California Irvine (UCI)Email verificata su uci.edu
- Hugo KrawczykAmazon Web ServicesEmail verificata su amazon.com
- Julian LossCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Jonathan KatzProfessor of Computer Science, University of MarylandEmail verificata su cs.umd.edu
- Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGEmail verificata su ed.ac.uk
- Tatiana BradleyPhD Candidate, Computer Science, University of California, IrvineEmail verificata su uci.edu
- Michel AbdallaÉcole Normale SupérieureEmail verificata su ens.fr
- Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECEmail verificata su fc.up.pt
- Gregory NevenChainlink LabsEmail verificata su smartcontract.com
- Anja LehmannHasso Plattner Institute, University of PotsdamEmail verificata su hpi.de
- Jan CamenischDFINITYEmail verificata su dfinity.org
- Taekyoung KwonYonsei UniversityEmail verificata su yonsei.ac.kr
- S. Dov GordonGeorge Mason UniversityEmail verificata su gmu.edu
- Ian McQuoidSecurity Researcher, MIT Lincoln LaboratoryEmail verificata su oregonstate.edu
- Lawrence RoyPostdoc, Aarhus UniversityEmail verificata su cs.au.dk
- Mike RosulekAssociate Professor, Oregon State UniversityEmail verificata su eecs.oregonstate.edu
- Chris PeikertProfessor, Computer Science and Engineering, University of MichiganEmail verificata su alum.mit.edu
- Franklin HardingEmail verificata su oregonstate.edu