Crea il mio profilo
Accesso pubblico
Visualizza tutto67 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Email verificata su ucsd.edu
- Huijia (Rachel) LinAssociate Professor at the University of WashingtonEmail verificata su cs.washington.edu
- Viet Tung HoangAssociate Professor at Florida State UniversityEmail verificata su cs.fsu.edu
- Joseph JaegerAssistant Professor, Georgia Institute of TechnologyEmail verificata su gatech.edu
- Chenzhi ZhuUniversity of WashingtonEmail verificata su cs.washington.edu
- Peter GažiIOG ResearchEmail verificata su iohk.io
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupEmail verificata su inf.unibe.ch
- krzysztof pietrzakProfessor, Cryptography, IST AustriaEmail verificata su ist.ac.at
- Shyam GollakotaProfessor, Allen School of Computer Science and Engineering, University of WashingtonEmail verificata su cs.washington.edu
- Thomas RistenpartProfessor of Computer Science, Cornell TechEmail verificata su cornell.edu
- Binyi ChenStanford UniversityEmail verificata su stanford.edu
- Justin ChanIncoming Assistant Professor at Carnegie Mellon UniversityEmail verificata su cmu.edu
- Jonathan LarsonMicrosoft ResearchEmail verificata su microsoft.com
- Ueli MaurerProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Yevgeniy DodisProfessor, New York UniversityEmail verificata su cs.nyu.edu
- Sudheesh SinganamallaPhD Candidate, University of WashingtonEmail verificata su cs.washington.edu
- Amr El AbbadiProfessor of Computer Science, UC Santa BarbaraEmail verificata su cs.ucsb.edu
- Victor ZakharyOracleEmail verificata su oracle.com
- Ashrujit GhoshalCarnegie Mellon UniversityEmail verificata su cs.cmu.edu
- Alexander VardyUniversity of California San DiegoEmail verificata su ucsd.edu