Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gil SegevProfessor of Computer Science, Hebrew UniversityVerified email at cs.stanford.edu
Mohammad MahmoodyAssociate Professor, University of VirginiaVerified email at virginia.edu
Ranjit KumaresanVerified email at csail.mit.edu
Alon RosenBocconi UniversityVerified email at unibocconi.it
Adi AkaviaThe University of HaifaVerified email at cs.haifa.ac.il
Ronen ShaltielProfessor of Computer Science, University of HaifaVerified email at cs.haifa.ac.il
Ian KashUniversity of Illinois at ChicagoVerified email at uic.edu
Stephen ChongHarvard UniversityVerified email at seas.harvard.edu
Yiling ChenHarvard UniversityVerified email at seas.harvard.edu
Daniel WichsNortheastern University, Associate ProfessorVerified email at ccs.neu.edu
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Pavel HubáčekCharles UniversityVerified email at iuuk.mff.cuni.cz
Lee NaishComputing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
Rafail OstrovskyNorman E. Friedman Chair Distinguished Professor of CS and MathematicsVerified email at cs.ucla.edu
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Amit SahaiSymantec Chair Professor of Computer Science, UCLA; Director of Center for Encrypted FunctionalitiesVerified email at cs.ucla.edu
Shahram KhazaeiSharif University of TechnologyVerified email at sharif.edu
John KelseyNISTVerified email at nist.gov
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu