Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Vinod VaikuntanathanProfessor of Computer Science, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
- Willy QuachCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Yael Tauman KalaiMicrosoft Research, MITVerified email at microsoft.com
- Rishab GoyalUW-MadisonVerified email at wisc.edu
- Sacha Servan-SchreiberMITVerified email at mit.edu
- Hoeteck WeeResearcher at CNRS / École Normale Supérieure, ParisVerified email at di.ens.fr
- Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
- Geoffroy CouteauCNRS Researcher in Theoretical Computer Science, IRIF, Université de ParisVerified email at irif.fr
- Srinivas DevadasEdwin Sibley Webster Professor of Electrical Engineering and Computer Science, MITVerified email at mit.edu
- Manolis KellisProfessor of Computer Science, MIT and Broad InstituteVerified email at mit.edu
- Angela YenMassachusetts Institute of TechnologyVerified email at mit.edu
- David WuUniversity of Texas at AustinVerified email at cs.utexas.edu
- Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu