Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Daniel J. Weitzner3Com Founders Senior Research Scientist, Massachusetts Institute of TechnologyEmail verificata su csail.mit.edu
- Ronald L. RivestMIT Institute ProfessorEmail verificata su mit.edu
- Leilani H. GilpinUC Santa CruzEmail verificata su ucsc.edu
- David BauAssistant Professor at Northeastern UniversityEmail verificata su northeastern.edu
- Lalana KagalMassachusetts Institute of TechnologyEmail verificata su csail.mit.edu
- Matthew GreenJohns Hopkins UniversityEmail verificata su cs.jhu.edu
- Sunoo ParkMITEmail verificata su csail.mit.edu
- Susan LandauTufts UniversityEmail verificata su privacyink.org
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Steven BellovinProfessor of Computer Science, Columbia UniversityEmail verificata su cs.columbia.edu
- Neha NarulaMIT Media LabEmail verificata su mit.edu
- Daniela MiaoMITEmail verificata su mit.edu
- James KoppelMITEmail verificata su mit.edu
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringEmail verificata su umich.edu
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityEmail verificata su anu.edu.au
- Ran CanettiProfessor of Computer Science, Boston UniversityEmail verificata su bu.edu
- Yael Tauman KalaiMicrosoft Research, MITEmail verificata su microsoft.com
- Ari TrachtenbergProfessor of Electrical and Computer Engineering, Boston UniversityEmail verificata su bu.edu
- Anna LysyanskayaProfessor of Computer Science, Brown UniversityEmail verificata su cs.brown.edu
- Marc A. ZissmanAssoc Head, Cyber Security and Information Sciences Division, MIT Lincoln LaboratoryEmail verificata su ll.mit.edu