Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu
Nathan ChenetteRose-Hulman Institute of TechnologyVerified email at rose-hulman.edu
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
George KolliosProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Kobbi NissimDept. of Computer Science (Georgetown)Verified email at georgetown.edu
Georgios KellarisLerna Inc.Verified email at lerna.ai
Younho LeeProfessor, IT Management Division, Department of Data Science, SeoulTechVerified email at seoultech.ac.kr
Craig GentryChief Scientist, CornamiVerified email at cornami.com
Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
Angelo De CaroIBM Research - ZurichVerified email at zurich.ibm.com
Dae Hyun YumMyongji UniversityVerified email at mju.ac.kr
Vipul GoyalNTT ResearchVerified email at vipulgoyal.org
Brent WatersUniversity of Texas at AustinVerified email at cs.utexas.edu
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Dana Dachman-SoledAssociate Professor, Department of Electrical and Computer Engineering, University of MarylandVerified email at umd.edu
Adam SmithProfessor of Computer Science, Boston UniversityVerified email at bu.edu
Leonid ReyzinProfessor of Computer Science, Boston UniversityVerified email at cs.bu.edu
Mohammad ZaheriDept. of Computer Science, Georgetown UniversityVerified email at georgetown.edu
Serge FehrCWIVerified email at cwi.nl
payman mohasselPrivacy at FacebookVerified email at fb.com