Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Arthur Azevedo de AmorimRochester Institute of TechnologyVerified email at rit.edu
Nikhil SwamyMicrosoft ResearchVerified email at microsoft.com
Aseem RastogiResearcher, Microsoft ResearchVerified email at microsoft.com
Cédric FournetMicrosoft ResearchVerified email at microsoft.com
Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity Center, Key Researcher SBA ResearchVerified email at tuwien.ac.at
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Jonathan ProtzenkoMicrosoft ResearchVerified email at ens-lyon.org
Karthikeyan BhargavanINRIAVerified email at inria.fr
Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
Brent YorgeyHendrix CollegeVerified email at hendrix.edu
Leonidas LampropoulosAssistant Professor, University of MarylandVerified email at umd.edu
Carmine AbateMPI-SPVerified email at mpi-sp.org
Roberto BlancoMPI-SPVerified email at csp.mpg.de
Vilhelm SjöbergYale UniversityVerified email at yale.edu
Tahina RamananandroMicrosoft ResearchVerified email at ramananandro.org
Michael GreenbergStevens Institute of Technology - Department of Computer ScienceVerified email at stevens.edu
Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtVerified email at inria.fr
Guido MartínezCIFASIS-CONICETVerified email at cifasis-conicet.gov.ar