Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Benjamin C. PierceProfessor of Computer and Information Science, University of PennsylvaniaVerified email at cis.upenn.edu
Arthur Azevedo de AmorimBoston UniversityVerified email at bu.edu
Nikhil SwamyMicrosoft ResearchVerified email at microsoft.com
Aseem RastogiResearcher, Microsoft ResearchVerified email at microsoft.com
Cédric FournetMicrosoft ResearchVerified email at microsoft.com
Matteo MaffeiFull Professor at TU WienVerified email at tuwien.ac.at
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Jonathan ProtzenkoMicrosoft ResearchVerified email at ens-lyon.org
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Karthikeyan BhargavanINRIAVerified email at inria.fr
Antoine Delignat-LavaudMicrosoft ResearchVerified email at microsoft.com
Leonidas LampropoulosAssistant Professor, University of MarylandVerified email at umd.edu
Michael GreenbergStevens Institute of Technology - Department of Computer ScienceVerified email at stevens.edu
Tahina RamananandroMicrosoft ResearchVerified email at ramananandro.org
Jean Karim ZinzindohouéPhD Student at INRIA RocquencourtVerified email at inria.fr
Brent YorgeyHendrix CollegeVerified email at hendrix.edu
Vilhelm SjöbergYale UniversityVerified email at yale.edu
Carmine AbateMPI-SPVerified email at mpi-sp.org
Andre DeHonUniversity of PennsylvaniaVerified email at acm.org
Danel AhmanPostDoc, Faculty of Mathematics and Physics, University of LjubljanaVerified email at fmf.uni-lj.si