Crea il mio profilo
Accesso pubblico
Visualizza tutto13 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Gil SegevProfessor of Computer Science, Hebrew UniversityEmail verificata su cs.stanford.edu
- Mohammad MahmoodyAssociate Professor, University of VirginiaEmail verificata su virginia.edu
- Ranjit KumaresanEmail verificata su csail.mit.edu
- Alon RosenBocconi UniversityEmail verificata su unibocconi.it
- Daniel WichsNortheastern University, ProfessorEmail verificata su ccs.neu.edu
- Ian KashUniversity of Illinois at ChicagoEmail verificata su uic.edu
- Stephen ChongHarvard UniversityEmail verificata su seas.harvard.edu
- Yiling ChenHarvard UniversityEmail verificata su seas.harvard.edu
- Adi AkaviaThe University of HaifaEmail verificata su cs.haifa.ac.il
- Ronen ShaltielProfessor of Computer Science, University of HaifaEmail verificata su cs.haifa.ac.il
- Pavel HubáčekCzech Academy of Sciences and Charles UniversityEmail verificata su iuuk.mff.cuni.cz
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHEmail verificata su cs.ucla.edu
- Yuval IshaiTechnionEmail verificata su cs.technion.ac.il
- Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAEmail verificata su cs.ucla.edu
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityEmail verificata su anu.edu.au
- John KelseyNISTEmail verificata su nist.gov
- Shahram KhazaeiSharif University of TechnologyEmail verificata su sharif.edu
- Yevgeniy DodisProfessor, New York UniversityEmail verificata su cs.nyu.edu
- Abhishek JainAssociate Professor, Johns Hopkins UniversityEmail verificata su cs.jhu.edu