Get my own profile
Public access
View all54 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Andrei LapetsReity, Nillion, and Choose KVerified email at reity.org
Azer BestavrosProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Nicolas AlhaddadBoston UniversityVerified email at bu.eduArkady YerukhimovichThe George Washington UniversityVerified email at gwu.edu
Frederick JansenNth PartyVerified email at nthparty.comAriel HamlinNortheastern University, MIT Lincoln LabVerified email at ll.mit.edu
Robert K. CunninghamCMU and PittVerified email at cunninghamfamily.net
Flavio du Pin CalmonHarvard UniversityVerified email at seas.harvard.edu
Muriel MedardProfessor of EECS, MITVerified email at mit.edu
Ari TrachtenbergProfessor of Electrical and Computer Engineering, Boston UniversityVerified email at bu.edu
Nikolaj VolgushevPreviously at the Alexandra InstituteVerified email at bu.edu
Vijay GadepallyMITVerified email at mit.edu
Kinan Dak AlbabBoston UniversityVerified email at bu.edu
Lucy QinGeorgetown UniversityVerified email at georgetown.edu
Sisi DuanResearch Scientist, PhD Advisor, Tsinghua UniversityVerified email at mail.tsinghua.edu.cn
Ken DuffyProfessor, Mathematics, and Electrical & Computer Engineering, Northeastern UniversityVerified email at northeastern.edu
Sarah SchefflerCarnegie Mellon University: Engineering and Public Policy, and Software and Societal SystemsVerified email at andrew.cmu.edu
Rawane IssaCryptography & Secure Computation Researcher at Galois, Inc.Verified email at bu.edu
Nabil SchearSenior Staff, MIT Lincoln LaboratoryVerified email at ll.mit.edu