Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Ranjit KumaresanVerified email at csail.mit.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Daniel WichsNortheastern University, ProfessorVerified email at ccs.neu.edu
Adi AkaviaThe University of HaifaVerified email at cs.haifa.ac.il
Ian KashUniversity of Illinois at ChicagoVerified email at uic.edu
Stephen ChongHarvard UniversityVerified email at seas.harvard.edu
Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
Ronen ShaltielProfessor of Computer Science, University of HaifaVerified email at cs.haifa.ac.il
Pavel HubáčekCzech Academy of Sciences and Charles UniversityVerified email at iuuk.mff.cuni.cz
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Rafail OstrovskyNorman E. Friedman Chair in Knowledge Sciences, Distinguished Prof. of CS & MATHVerified email at cs.ucla.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Amit SahaiSymantec Chair Professor of Computer Science; Professor of Mathematics (by courtesy), UCLAVerified email at cs.ucla.edu
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
Shahram KhazaeiSharif University of TechnologyVerified email at sharif.edu
John KelseyNISTVerified email at nist.gov
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Abhishek JainAssociate Professor, Johns Hopkins UniversityVerified email at cs.jhu.edu