Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dan BonehProfessor of Computer Science, Stanford UniversityEmail verificata su cs.stanford.edu
- James MickensHarvard UniversityEmail verificata su g.harvard.edu
- Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyEmail verificata su csail.mit.edu
- David WuUniversity of Texas at AustinEmail verificata su cs.utexas.edu
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyEmail verificata su alum.mit.edu
- Steven CheungSRI InternationalEmail verificata su sri.com
- Zachary WeinbergCarnegie Mellon UniversityEmail verificata su owlfolio.org
- Vinod YegneswaranPrincipal Computer Scientist, SRI InternationalEmail verificata su csl.sri.com
- Nickolai ZeldovichEmail verificata su csail.mit.edu
- Venkatasubramanian ViswanathanAssociate Professor, University of MichiganEmail verificata su umich.edu
- Matei ZahariaUC Berkeley and DatabricksEmail verificata su berkeley.edu
- John C MitchellProfessor of Computer Science, Stanford UniversityEmail verificata su Stanford.edu
- Elie BurszteinGoogle & DeepMind AI Cybersecurity technical and research leadEmail verificata su google.com
- Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaEmail verificata su math.upenn.edu
- Sharada SundaramStanford UniversityEmail verificata su cs.stanford.edu
- Heinz PitschRWTH Aachen University, Stanford University, UC San DiegoEmail verificata su itv.rwth-aachen.de