Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Ranjit KumaresanVerified email at csail.mit.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Adi AkaviaThe University of HaifaVerified email at cs.haifa.ac.il
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Ian KashUniversity of Illinois at ChicagoVerified email at uic.edu
Stephen ChongHarvard UniversityVerified email at seas.harvard.edu
Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
Ronen ShaltielProfessor of Computer Science, University of HaifaVerified email at cs.haifa.ac.il
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Pavel HubáčekCharles UniversityVerified email at iuuk.mff.cuni.cz
Rafail OstrovskyNorman E. Friedman Distinguished Professor of Computer Science and MathematicsVerified email at cs.ucla.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
John KelseyNISTVerified email at nist.gov
Shahram KhazaeiSharif University of TechnologyVerified email at sharif.edu
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu