Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David MolnarVerified email at microsoft.com
Benjamin ZornMicrosoft Research, RedmondVerified email at acm.org
Monica S. LamProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Matt FredriksonCarnegie Mellon UniversityVerified email at cs.cmu.edu
Peter SnyderBrave SoftwareVerified email at brave.com
Margus VeanesMicrosoft ResearchVerified email at microsoft.com
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Emre KıcımanSenior Principal Research Manager, Microsoft ResearchVerified email at microsoft.com
Nikhil SwamyMicrosoft ResearchVerified email at microsoft.com
Daniel PerezImperial College LondonVerified email at imperial.ac.uk
Prateek SaxenaNational University of SingaporeVerified email at comp.nus.edu.sg
Paruj RatanaworabhanAssitant Professor, Dept. of Computer Engineering, Kasetsart UniverisityVerified email at ku.ac.th
Matteo VarvelloResearcher at Bell LabsVerified email at nokia.com
Pieter HooimeijerDatabricksVerified email at virginia.edu
Thomas ZimmermannSr. Principal Researcher at Microsoft Research, RedmondVerified email at microsoft.com
Panagiotis (Panos) PapadopoulosHead of Red Team, iProov & Visiting Researcher, FORTHVerified email at ics.forth.gr
Eyal OfekChair of Computer Science - University of Birmingham, UKVerified email at microsoft.com
Loris D'AntoniUniversity of California-San DiegoVerified email at ucsd.edu
Somesh JhaLubar Chair of Computer Science, University of WisconsinVerified email at cs.wisc.edu
Úlfar ErlingssonDistinguished Engineer at Google CloudVerified email at google.com