Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaEmail verificata su cis.upenn.edu
- Arthur Azevedo de AmorimRochester Institute of TechnologyEmail verificata su rit.edu
- Nikhil SwamyMicrosoft ResearchEmail verificata su microsoft.com
- Aseem RastogiResearcher, Microsoft ResearchEmail verificata su microsoft.com
- Cédric FournetMicrosoft ResearchEmail verificata su microsoft.com
- Matteo MaffeiFull Professor at TU WienEmail verificata su tuwien.ac.at
- Santiago Zanella-BéguelinMicrosoft ResearchEmail verificata su microsoft.com
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Jonathan ProtzenkoMicrosoft ResearchEmail verificata su ens-lyon.org
- Brent YorgeyHendrix CollegeEmail verificata su hendrix.edu
- Karthikeyan BhargavanINRIAEmail verificata su inria.fr
- Antoine Delignat-LavaudMicrosoft ResearchEmail verificata su microsoft.com
- Leonidas LampropoulosAssistant Professor, University of MarylandEmail verificata su umd.edu
- Vilhelm SjöbergYale UniversityEmail verificata su yale.edu
- Roberto BlancoMPI-SPEmail verificata su csp.mpg.de
- Carmine AbateMPI-SPEmail verificata su mpi-sp.org
- Tahina RamananandroMicrosoft ResearchEmail verificata su ramananandro.org
- Michael GreenbergStevens Institute of Technology - Department of Computer ScienceEmail verificata su stevens.edu
- Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtEmail verificata su inria.fr
- Guido MartínezCIFASIS-CONICETEmail verificata su cifasis-conicet.gov.ar