Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Arthur Azevedo de AmorimRochester Institute of TechnologyVerified email at rit.edu
Nikhil SwamyMicrosoft ResearchVerified email at microsoft.com
Aseem RastogiResearcher, Microsoft ResearchVerified email at microsoft.com
Cédric FournetMicrosoft ResearchVerified email at microsoft.com
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
Jonathan ProtzenkoMicrosoft Azure ResearchVerified email at ens-lyon.org
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Karthikeyan BhargavanINRIAVerified email at inria.fr
Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
Brent YorgeyHendrix CollegeVerified email at hendrix.edu
Carmine AbateMPI-SPVerified email at mpi-sp.org
Roberto BlancoMPI-SPVerified email at csp.mpg.de
Leonidas LampropoulosAssistant Professor, University of MarylandVerified email at umd.edu
Tahina RamananandroMicrosoft ResearchVerified email at ramananandro.org
Vilhelm SjöbergYale UniversityVerified email at yale.edu
Michael GreenbergStevens Institute of Technology - Department of Computer ScienceVerified email at stevens.edu
Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtVerified email at inria.fr
Andre DeHonUniversity of PennsylvaniaVerified email at acm.org