Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stefano TessaroUniversity of WashingtonEmail verificata su cs.washington.edu
- Sikhar PatranabisIBM Research IndiaEmail verificata su ibm.com
- Rajat SadhukhanIndian Institute of Technology-Kharagpur, IndiaEmail verificata su iitkgp.ac.in
- Debdeep MukhopadhyayProfessor, Dept of Computer Science and Engineering, IIT Kharagpur, IndiaEmail verificata su cse.iitkgp.ac.in
- Ilan KomargodskiHebrew UniversityEmail verificata su cs.huji.ac.il
- NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTEmail verificata su tcgcrest.org
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsEmail verificata su computer.org
- Joseph JaegerAssistant Professor, Georgia Institute of TechnologyEmail verificata su gatech.edu
- Cody FreitagPostdoc, Northeastern University and Boston UniversityEmail verificata su northeastern.edu
- Vishal SaraswatBosch Global Software Technologies, Bangalore, IndiaEmail verificata su umn.edu
- Thomas De CnuddeEmail verificata su fabriccryptography.com
- Riddhi GhosalUCLAEmail verificata su cs.ucla.edu
- Elaine ShiCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Mingxun ZhouCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu