Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
- Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
- Ranjit KumaresanVerified email at csail.mit.edu
- Alon RosenBocconi UniversityVerified email at unibocconi.it
- Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
- Ian KashUniversity of Illinois at ChicagoVerified email at uic.edu
- Stephen ChongHarvard UniversityVerified email at seas.harvard.edu
- Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
- Adi AkaviaThe University of HaifaVerified email at cs.haifa.ac.il
- Ronen ShaltielProfessor of Computer Science, University of HaifaVerified email at cs.haifa.ac.il
- Pavel HubáčekCzech Academy of Sciences and Charles UniversityVerified email at iuuk.mff.cuni.cz
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
- Yuval IshaiTechnionVerified email at cs.technion.ac.il
- Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
- John KelseyNISTVerified email at nist.gov
- Shahram KhazaeiSharif University of TechnologyVerified email at sharif.edu
- Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
- Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu