Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Cédric FournetMicrosoft ResearchEmail verificata su microsoft.com
- Karthikeyan BhargavanINRIAEmail verificata su inria.fr
- Santiago Zanella-BéguelinMicrosoft ResearchEmail verificata su microsoft.com
- Antoine Delignat-LavaudMicrosoft ResearchEmail verificata su microsoft.com
- Cătălin HrițcuTenured Faculty at MPI-SPEmail verificata su mpi-sp.org
- Jonathan ProtzenkoMicrosoft ResearchEmail verificata su ens-lyon.org
- Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtEmail verificata su inria.fr
- Pierre-Yves StrubResearch Scientist, PQShieldEmail verificata su strub.nu
- Markulf KohlweissUniveristy of EdinburghEmail verificata su ed.ac.uk
- Georges GonthierPrincipal Researcher, Microsoft ResearchEmail verificata su microsoft.com
- Gavin BiermanOracleEmail verificata su oracle.com
- Danel AhmanInstitute of Computer Science, University of TartuEmail verificata su ut.ee
- Avik ChaudhuriSoftware Engineer, MetaEmail verificata su meta.com
- Bryan ParnoCarnegie Mellon UniversityEmail verificata su cmu.edu
- Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity Center, Key Researcher SBA ResearchEmail verificata su tuwien.ac.at
- Samin IshtiaqRiverlaneEmail verificata su riverlane.com
- Ashay RaneGraduate Research Assistant, The University of Texas at AustinEmail verificata su utexas.edu
- Gordon PlotkinLaboratory for Foundations of Computer Science, School of Informatics, University of EdinburghEmail verificata su inf.ed.ac.uk
- Piotr MardzielindependentEmail verificata su cmu.edu
- Rob JohnsonVMware ResearchEmail verificata su vmware.com