Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Marie-Sarah LacharitéRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Vincent BindschaedlerAssistant Professor at the University of FloridaVerified email at cise.ufl.edu
Vitaly ShmatikovVerified email at cs.cornell.edu
Muhammad NaveedPulses Research Institute, AARI, Faisalabad, PakistanVerified email at aari.punjab.gov.pk
Julia LenCornell UniversityVerified email at cs.cornell.edu
Kevin SekniqiPhD Computer Science, Cornell UniversityVerified email at sekniqi.com
Richard McPhersonUniversity of Texas at AustinVerified email at cs.utexas.edu
Yevgeniy DodisProfessor, New York UniversityVerified email at cs.nyu.edu
Joanne WoodageRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Nathaniel HustedVerified email at indiana.edu
abhi shelatProfessor of Computer ScienceVerified email at neu.edu
Rachit AgarwalCornell UniversityVerified email at cs.cornell.edu
Anurag KhandelwalAssistant ProfessorVerified email at yale.edu
Lloyd BrownUC BerkeleyVerified email at berkeley.edu
Ian MiersUniversity of MarylandVerified email at umd.edu
Nirvan TyagiCornell UniversityVerified email at cs.cornell.edu
Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyVerified email at gatech.edu