Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Paul SyversonMathematician, U.S. Naval Research LaboratoryEmail verificata su nrl.navy.mil
- David MolnarEmail verificata su microsoft.com
- Michael J. FreedmanRobert E. Kahn Professor of Computer Science, Princeton UniversityEmail verificata su cs.princeton.edu
- Steven J. MurdochDepartment of Computer Science, University College LondonEmail verificata su ucl.ac.uk
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoEmail verificata su uchicago.edu
- George DanezisMysten Labs & University College LondonEmail verificata su ucl.ac.uk
- Alessandro AcquistiCarnegie Mellon UniversityEmail verificata su andrew.cmu.edu
- Kevin BauerMIT Lincoln LaboratoryEmail verificata su ll.mit.edu
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryEmail verificata su nrl.navy.mil
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaEmail verificata su umn.edu
- Karsten LoesingThe Tor ProjectEmail verificata su torproject.org
- Nathan S. EvansAssociate Teaching Professor/Faculty Directory Cybersecurity, University of DenverEmail verificata su du.edu
- Christian GrothoffBern University of Applied SciencesEmail verificata su grothoff.org
- Dan BonehProfessor of Computer Science, Stanford UniversityEmail verificata su cs.stanford.edu
- Jonathan EllithorpePhD, Stanford UniversityEmail verificata su cs.stanford.edu
- Emily StarkGoogleEmail verificata su google.com
- Justin SamuelUniversity of California, BerkeleyEmail verificata su cs.berkeley.edu
- Justin CapposAssociate Professor of Computer Science and Engineering, NYUEmail verificata su nyu.edu
- Tariq ElahiAssistant Professor, School of Informatics - University of EdinburghEmail verificata su ed.ac.uk
- Mashael AlSabahQatar Computing Research InstituteEmail verificata su hbku.edu.qa