Get my own profile
Public access
View all55 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Sanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
- Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
- Jörn Müller-QuadeProfessor für Informatik, Karlsruhe Institute of TechnologyVerified email at kit.edu
- Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.il
- Pedro BrancoBocconi UniversityVerified email at unibocconi.it
- Sihang PuCNRSVerified email at irif.fr
- Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
- Lucjan HanzlikCISPA, Saarland University, Saarland Informatics CampusVerified email at cispa.saarland
- Daniel MasnyMetaVerified email at fb.com
- Tamer MourBocconi UniversityVerified email at weizmann.ac.il
- Peihan MiaoBrown UniversityVerified email at brown.edu
- Divya GuptaPrincipal Researcher, Microsoft Research IndiaVerified email at microsoft.com
- Anderson C. A. NascimentoHead of Security Research - VisaVerified email at visa.com
- Maciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
- Pratyay MukherjeeSupra ResearchVerified email at supraoracles.com
- Rafael DowsleyMonash UniversityVerified email at monash.edu
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland