Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Giuseppe AtenieseGeorge Mason UniversityEmail verificata su gmu.edu
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyEmail verificata su di.uniroma1.it
- David NuñezCryptography R&D at NuCypher Inc.Email verificata su nucypher.com
- Dario PasquiniGeorge Mason UniversityEmail verificata su gmu.edu
- Luca SchiattiAccenture LabsEmail verificata su accenture.com
- Giulio MalavoltaBocconi UniversityEmail verificata su unibocconi.it
- Daniele FrioloAssistant Professor at Sapienza University of RomeEmail verificata su di.uniroma1.it
- Bernardo MagriThe University of ManchesterEmail verificata su manchester.ac.uk
- Boaz BarakHarvard UniversityEmail verificata su boazbarak.org
- Benjamin L. EdelmanHarvard UniversityEmail verificata su g.harvard.edu
- Hanlin ZhangHarvard UniversityEmail verificata su g.harvard.edu
- Ahmadreza RahimiMax Planck Institute for Security and PrivacyEmail verificata su mpi-sp.org
- Monosij MaitraIIT KharagpurEmail verificata su cse.iitkgp.ac.in
- Long ChenInstitute of Software Chinese Academy of SciencesEmail verificata su iscas.ac.cn
- Dimitrios PapadopoulosHong Kong University of Science and TechnologyEmail verificata su cse.ust.hk
- Matteo CampanelliMatter LabsEmail verificata su matterlabs.dev
- Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkEmail verificata su cs.au.dk
- Foteini BaldimtsiAssοciate Professor, George Mason UniversityEmail verificata su gmu.edu
- Ioanna KarantaidouPostdoctoral researcherEmail verificata su nyu.edu
- Evgenios M. KornaropoulosGeorge Mason UniversityEmail verificata su gmu.edu
Segui