Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Kevin LeeJ.P. Morgan AI ResearchVerified email at jpmorgan.com
Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Nicolas ChristinProfessor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Ethan HeilmanBoston University, BastionZeroVerified email at bu.edu
Kyle HoganMITVerified email at mit.edu
Shashvat SrivastavaVerified email at mit.edu
Steven GoldfederCornell TechVerified email at cornell.edu
Alishah ChatorJohns Hopkins UniversityVerified email at cs.jhu.edu
Harry KalodnerPrinceton UniversityVerified email at cs.princeton.edu
Martin PlattnerUniversität Innsbruck, AustriaVerified email at mplattner.at
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Ittay EyalAssociate Professor, ECE, TechnionVerified email at technion.ac.il
Emin Gün SirerCornell UniversityVerified email at systems.cs.cornell.edu
Syed Taha AliNational University of Science and TechnologyVerified email at seecs.edu.pk
Patrick McCorryCrypto enthusiast