Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Bill HornePrincipal Product Manager, AWS CryptographyVerified email at amazon.com
- Ilaria LiccardiCSAIL, MITVerified email at mit.edu
- Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
- Daniel J. Weitzner3Com Founders Senior Research Scientist, Massachusetts Institute of TechnologyVerified email at csail.mit.edu
- Paul LeachAffiliate Professor of Computer Science, University of WashingtonVerified email at uw.edu
- Prasad RaoResearch Scientist, LinkedInVerified email at linkedin.com
- Sandeep BhattStevens Institute of TechnologyVerified email at stevens.edu
- Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
- Jeff HodgesKings Mountain Systems and Google (as of Nov-2018)Verified email at KingsMountain.com
- Lalana KagalMassachusetts Institute of TechnologyVerified email at csail.mit.edu
- Robert TarjanProfessor of Computer Science, Princeton UniversityVerified email at cs.princeton.edu
- Stuart HaberStuart Haber Crypto, LLCVerified email at acm.org
- Carlisle AdamsSchool of Electrical Engineering and Computer Science, University of OttawaVerified email at uottawa.ca