Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Péter BurcsiEötvös Loránd UniversityEmail verificata su inf.elte.hu
- Ferenc BéresInstitute for Computer Science and Control (SZTAKI)Email verificata su sztaki.hu
- András BenczúrInstitute for Computer Science and ControlEmail verificata su sztaki.hu
- Laszlo GulyasEIT Digital, Lorand Eotvos UniversityEmail verificata su inf.elte.hu
- Omer ShlomovitsingonyamaEmail verificata su ingonyama.com
- Mikerah Quintyne-CollinsHashCloak IncEmail verificata su hashcloak.com
- Máté HorváthPostdoc, University of WuppertalEmail verificata su crysys.hu
- Mike WuStanford UniversityEmail verificata su cs.stanford.edu
- Varun MadathilGraduate Research Assistant, North Carolina State UniversityEmail verificata su ncsu.edu
- Alessandra ScafuroNorth Carolina State UniversityEmail verificata su ncsu.edu
- Balázs PejóCrySyS LabEmail verificata su crysys.hu
- Joseph BonneauNew York UniversityEmail verificata su cs.nyu.edu
- Domokos Miklós KelenEötvös Loránd UniversityEmail verificata su sztaki.mta.hu
- Yuval KogmanunaffiliatedEmail verificata su woobling.org
- Noemi GlaeserPhD student, University of Maryland & Max Planck Institute for Security and Privacy (MPI-SP)Email verificata su umd.edu
- Pratyush Ranjan TiwariJohns Hopkins UniversityEmail verificata su jhu.edu
- Péter KutasEötvös Loránd University and University of BirminghamEmail verificata su bham.ac.uk
- Valeria NikolaenkoResearch Partner, A16Z CryptoEmail verificata su cs.stanford.edu
- YINUO ZHANGUC BerkeleyEmail verificata su berkeley.edu