Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
- Arthur Azevedo de AmorimRochester Institute of TechnologyVerified email at rit.edu
- Nikhil SwamyMicrosoft ResearchVerified email at microsoft.com
- Aseem RastogiResearcher, Microsoft ResearchVerified email at microsoft.com
- Cédric FournetMicrosoft ResearchVerified email at microsoft.com
- Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity Center, Key Researcher SBA ResearchVerified email at tuwien.ac.at
- Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
- Jonathan ProtzenkoMicrosoft ResearchVerified email at ens-lyon.org
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Karthikeyan BhargavanINRIAVerified email at inria.fr
- Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
- Brent YorgeyHendrix CollegeVerified email at hendrix.edu
- Leonidas LampropoulosAssistant Professor, University of MarylandVerified email at umd.edu
- Carmine AbateMPI-SPVerified email at mpi-sp.org
- Roberto BlancoMPI-SPVerified email at csp.mpg.de
- Vilhelm SjöbergYale UniversityVerified email at yale.edu
- Tahina RamananandroMicrosoft ResearchVerified email at ramananandro.org
- Michael GreenbergStevens Institute of Technology - Department of Computer ScienceVerified email at stevens.edu
- Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtVerified email at inria.fr
- Guido MartínezCIFASIS-CONICETVerified email at cifasis-conicet.gov.ar