Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Roberto TamassiaPlastech Professor of Computer Science, Brown UniversityVerified email at cs.brown.edu
- Charalampos PapamanthouYale UniversityVerified email at yale.edu
- Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
- Michael T. GoodrichProfessor of Computer Science, University of California, IrvineVerified email at uci.edu
- Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
- Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
- Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
- Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
- Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
- Marten van DijkComputer Security, CWI, Amsterdam; Vrije Universiteit van Amsterdam; ECE Department UConn