Get my own profile
Public access
View all21 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.eduArthur Azevedo de AmorimRochester Institute of TechnologyVerified email at rit.edu
Nikhil SwamyMicrosoft ResearchVerified email at microsoft.comAseem RastogiResearcher, Microsoft ResearchVerified email at microsoft.com
Cédric FournetMicrosoft ResearchVerified email at microsoft.comSantiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
Jonathan ProtzenkoGoogle Information Security EngineeringVerified email at ens-lyon.org
Karthikeyan BhargavanCryspen and INRIAVerified email at inria.fr
Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Brent YorgeyHendrix CollegeVerified email at hendrix.edu
Michael GreenbergStevens Institute of Technology - Department of Computer ScienceVerified email at stevens.edu
Carmine AbateBarkhausen InstitutVerified email at barkhauseninstitut.org
Roberto BlancoMPI-SPVerified email at csp.mpg.de
Tahina RamananandroMicrosoft ResearchVerified email at ramananandro.orgLeonidas LampropoulosAssistant Professor, University of MarylandVerified email at umd.edu
Guido MartínezMicrosoft ResearchVerified email at microsoft.com
Vilhelm SjöbergYale UniversityVerified email at yale.eduDanel AhmanInstitute of Computer Science, University of TartuVerified email at ut.ee