Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Avradip MandalVecsecVerified email at vecsec.com
- John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUVerified email at cmu.edu
- Kevin LewiFacebookVerified email at cs.stanford.edu
- Hayato Ushijima-MwesigwaFujitsu Laboratories of America Inc.Verified email at fujitsu.com
- Takeshi ShimoyamaNational Institute of InformaticsVerified email at nii.ac.jp
- David WuUniversity of Texas at AustinVerified email at cs.utexas.edu
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
- Mark A UnderwoodSynchronyVerified email at syf.com
- Sarvagya UpadhyayFujitsu Research of AmericaVerified email at fujitsu.com
- Daisuke MashimaIllinois Advanced Research Center at Singapore (Illinois ARCS) and National University of SingaporeVerified email at adsc-create.edu.sg
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Eldan CohenUniversity of TorontoVerified email at mie.utoronto.ca
- Pratyusa K. ManadhataFacebookVerified email at alumni.cmu.edu
- Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
- Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
- Hang ZhaoColumbia UniversityVerified email at cs.columbia.edu
- Jiaxin PanUniversity of KasselVerified email at uni-kassel.de
- Praveen MurthyFujitsu Labs of AmericaVerified email at us.fujitsu.com
- Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaVerified email at math.upenn.edu