Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- John SteinbergerTsinghua University, BeijingEmail verificata su tsinghua.edu.cn
- Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Seongkwang KimSenior Engineer in Samsung SDSEmail verificata su samsung.com
- Martijn StamChief Research Scientist at Simula UiB, NorwayEmail verificata su simula.no
- Je Hong ParkElectronics and Telecommunications Research InstituteEmail verificata su nsr.re.kr
- Jihoon ChoHead of Security Resarch Team in Samsung SDSEmail verificata su samsung.com
- Wonseok ChoiPostdoc, Purdue UniversityEmail verificata su purdue.edu
- Mincheol SonSchool of Electrical Engineering, KAISTEmail verificata su kaist.ac.kr
- Joohee LeeAssistant Professor, Sungshin Women's UniversityEmail verificata su sungshin.ac.kr
- Yannick SeurinCryptographer at LedgerEmail verificata su ledger.com
- Yongjin YeomProfessor of Mathematics, Kookmin UniversityEmail verificata su kookmin.ac.kr
- Shan ChenSouthern University of Science and Technology (SUSTech)Email verificata su sustech.edu.cn
- Aaram YunEmail verificata su ewha.ac.kr
- Bart MenninkDigital Security Group, Radboud University, NijmegenEmail verificata su cs.ru.nl
- Yevgeniy DodisProfessor, New York UniversityEmail verificata su cs.nyu.edu
- Jonathan KatzProfessor of Computer Science, University of MarylandEmail verificata su cs.umd.edu
- Deukjo Hong전북대학교 컴퓨터인공지능학부 교수Email verificata su jbnu.ac.kr
- Stefano TessaroProfessor at the University of WashingtonEmail verificata su cs.washington.edu
- Peter GažiIOG ResearchEmail verificata su iohk.io
- Atul LuykxGoogleEmail verificata su google.com