Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Avradip MandalVecsecEmail verificata su vecsec.com
- John C MitchellProfessor of Computer Science, Stanford UniversityEmail verificata su Stanford.edu
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUEmail verificata su cmu.edu
- Kevin LewiFacebookEmail verificata su cs.stanford.edu
- Hayato Ushijima-MwesigwaFujitsu Laboratories of America Inc.Email verificata su fujitsu.com
- Takeshi ShimoyamaNational Institute of InformaticsEmail verificata su nii.ac.jp
- David WuUniversity of Texas at AustinEmail verificata su cs.utexas.edu
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsEmail verificata su tu-berlin.de
- Mark A UnderwoodSynchronyEmail verificata su syf.com
- Sarvagya UpadhyayFujitsu Research of AmericaEmail verificata su fujitsu.com
- Daisuke MashimaIllinois Advanced Research Center at Singapore (Illinois ARCS) and National University of SingaporeEmail verificata su adsc-create.edu.sg
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyEmail verificata su alum.mit.edu
- Eldan CohenUniversity of TorontoEmail verificata su mie.utoronto.ca
- Pratyusa K. ManadhataFacebookEmail verificata su alumni.cmu.edu
- Jorge LoboICREA - Universitat Pompeu FabraEmail verificata su upf.edu
- Steven BellovinProfessor of Computer Science, Columbia UniversityEmail verificata su cs.columbia.edu
- Hang ZhaoColumbia UniversityEmail verificata su cs.columbia.edu
- Jiaxin PanUniversity of KasselEmail verificata su uni-kassel.de
- Praveen MurthyFujitsu Labs of AmericaEmail verificata su us.fujitsu.com
- Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaEmail verificata su math.upenn.edu