Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Arthur Azevedo de AmorimRochester Institute of TechnologyVerified email at rit.edu
Nikhil SwamyMicrosoft ResearchVerified email at microsoft.com
Aseem RastogiResearcher, Microsoft ResearchVerified email at microsoft.com
Cédric FournetMicrosoft ResearchVerified email at microsoft.com
Matteo MaffeiFull Professor at TU WienVerified email at tuwien.ac.at
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Jonathan ProtzenkoMicrosoft ResearchVerified email at ens-lyon.org
Karthikeyan BhargavanINRIAVerified email at inria.fr
Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
Leonidas LampropoulosAssistant Professor, University of MarylandVerified email at umd.edu
Tahina RamananandroMicrosoft ResearchVerified email at ramananandro.org
Brent YorgeyHendrix CollegeVerified email at hendrix.edu
Michael GreenbergStevens Institute of Technology - Department of Computer ScienceVerified email at stevens.edu
Carmine AbateMPI-SPVerified email at mpi-sp.org
Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtVerified email at inria.fr
Vilhelm SjöbergYale UniversityVerified email at yale.edu
Andre DeHonUniversity of PennsylvaniaVerified email at acm.org
Danel AhmanPostDoc, Faculty of Mathematics and Physics, University of LjubljanaVerified email at fmf.uni-lj.si