Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sanjam GargUniversity of California, BerkeleyEmail verificata su berkeley.edu
- Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumEmail verificata su rub.de
- Peter RindalVisa ReseachEmail verificata su visa.com
- Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Email verificata su cispa.de
- Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Jiaxin PanUniversity of KasselEmail verificata su uni-kassel.de
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyEmail verificata su di.uniroma1.it
- Siyao GUONYU ShanghaiEmail verificata su nyu.edu
- Alon RosenBocconi UniversityEmail verificata su unibocconi.it
- Andrej BogdanovChinese University of Hong KongEmail verificata su cse.cuhk.edu.hk
- Silas RichelsonProfessor of Computer Science, UC RiversideEmail verificata su cs.ucr.edu
- Sebastian FaustTU DarmstadtEmail verificata su cs.tu-darmstadt.de
- Daniel WichsNortheastern University, Associate ProfessorEmail verificata su ccs.neu.edu
- Pratyay MukherjeeSupra ResearchEmail verificata su supraoracles.com
- krzysztof pietrzakProfessor, Cryptography, IST AustriaEmail verificata su ist.ac.at
- Vadim LyubashevskyIBM Research Europe, ZurichEmail verificata su zurich.ibm.com
- Stefan DziembowskiUniversity of Warsaw and IDEAS NCBREmail verificata su mimuw.edu.pl
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainEmail verificata su uclouvain.be
- Daniele FrioloAssistant Professor at Sapienza University of RomeEmail verificata su di.uniroma1.it
- Gaven WatsonMetaEmail verificata su meta.com