Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Ranjit KumaresanVerified email at csail.mit.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Ian KashUniversity of Illinois at ChicagoVerified email at uic.edu
Stephen ChongHarvard UniversityVerified email at seas.harvard.edu
Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
Ronen ShaltielProfessor of Computer Science, University of HaifaVerified email at cs.haifa.ac.il
Adi AkaviaThe University of HaifaVerified email at cs.haifa.ac.il
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Pavel HubáčekCzech Academy of Sciences and Charles UniversityVerified email at iuuk.mff.cuni.cz
Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
John KelseyNISTVerified email at nist.gov
Shahram KhazaeiSharif University of TechnologyVerified email at sharif.edu
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu