Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
Roberto TamassiaPlastech Professor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Charalampos PapamanthouYale UniversityVerified email at yale.edu
Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Michael T. GoodrichProfessor of Computer Science, University of California, IrvineVerified email at uci.edu
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Ran CanettiProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Marten van DijkComputer Security, CWI, Amsterdam; Vrije Universiteit van Amsterdam; ECE Department UConn