Get my own profile
Public access
View all33 articles
1 article
available
not available
Based on funding mandates
Co-authors
Yuval YaromThe University of AdelaideVerified email at cs.adelaide.edu.au
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Moritz LippGraz University of TechnologyVerified email at iaik.tugraz.at
Eran TromerTel Aviv University + Columbia UniversityVerified email at cs.tau.ac.il
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Marina MinkinUniversity of MichiganVerified email at umich.edu
Alessandro ChiesaUC BerkeleyVerified email at berkeley.edu
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Eli Ben-SassonCo-founder & President, StarkWareVerified email at starkware.co
Mark SilbersteinAssociate Professor, Technion, IsraelVerified email at ee.technion.ac.il
Lev PachmanovTel Aviv UniversityVerified email at tau.ac.il
Itamar PipmanTel Aviv UniversityVerified email at post.tau.ac.il
Madars VirzaMIT Media LabVerified email at mit.edu
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
Ofir WeisseUniversity of MichiganVerified email at umich.edu
Baris KasikciUniversity of MichiganVerified email at umich.edu
Raoul StrackxFortanixVerified email at fortanix.com