Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Marie-Sarah LacharitéRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Vincent BindschaedlerAssistant Professor at the University of FloridaVerified email at cise.ufl.edu
Muhammad NaveedPulses Research Institute, AARI, Faisalabad, PakistanVerified email at aari.punjab.gov.pk
Kevin SekniqiPhD Computer Science, Cornell UniversityVerified email at sekniqi.com
Julia LenCornell UniversityVerified email at cs.cornell.edu
Richard McPhersonUniversity of Texas at AustinVerified email at cs.utexas.edu
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Joanne WoodageRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Nathaniel HustedVerified email at indiana.edu
abhi shelatProfessor of Computer ScienceVerified email at neu.edu
Rachit AgarwalCornell UniversityVerified email at cs.cornell.edu
Anurag KhandelwalAssistant ProfessorVerified email at yale.edu
Lloyd BrownUC BerkeleyVerified email at berkeley.edu
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
Ian MiersUniversity of MarylandVerified email at umd.edu
Nirvan TyagiCornell UniversityVerified email at cs.cornell.edu
Yuval YaromThe University of AdelaideVerified email at cs.adelaide.edu.au