Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Orr DunkelmanComputer Science Dept., University of Haifa, IsraelEmail verificata su cs.haifa.ac.il
- Nathan KellerDepartment of Mathematics, Bar Ilan University, IsraelEmail verificata su macs.biu.ac.il
- Yuval YaromRuhr University BochumEmail verificata su rub.de
- Daniel GenkinGeorgia TechEmail verificata su gatech.edu
- Mathy VanhoefDistriNet, KU LeuvenEmail verificata su kuleuven.be
- Colin O'FlynnDalhousie UniversityEmail verificata su oflynn.com
- Moni NaorProfessor of Computer Science, Weizmann Institute of ScienceEmail verificata su weizmann.ac.il
- Benny PinkasBar Ilan University and Aptos LabsEmail verificata su biu.ac.il
- Kenny PatersonProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Andrew KwongUNC Chapel HillEmail verificata su cs.unc.edu
- Itay SafranPost-Doctoral Research Associate, Purdue UniversityEmail verificata su purdue.edu
- Shaanan CohneyUniversity of MelbourneEmail verificata su unimelb.edu.au
- Nadia HeningerUniversity of California San DiegoEmail verificata su cs.ucsd.edu
- Cas CremersCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Chitchanok ChuengsatiansupThe University of MelbourneEmail verificata su unimelb.edu.au
- Sioli O'ConnellThe University of AdelaideEmail verificata su adelaide.edu.au
- Ayush AgarwalMasters, University of Michigan, Ann ArborEmail verificata su umich.edu
- Chaya KellerDepartment of Computer Science, Ariel UniversityEmail verificata su ariel.ac.il