Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
- David NuñezCryptography R&D at NuCypher Inc.Verified email at nucypher.com
- Dario PasquiniGeorge Mason UniversityVerified email at gmu.edu
- Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
- Daniele FrioloAssistant Professor at Sapienza University of RomeVerified email at di.uniroma1.it
- Luca SchiattiAccenture LabsVerified email at accenture.com
- Boaz BarakHarvard UniversityVerified email at boazbarak.org
- Benjamin L. EdelmanHarvard UniversityVerified email at g.harvard.edu
- Hanlin ZhangHarvard UniversityVerified email at g.harvard.edu
- Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
- Luigi RussoEURECOMVerified email at eurecom.fr
- Ahmadreza RahimiMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
- Monosij MaitraIIT KharagpurVerified email at cse.iitkgp.ac.in
- Long ChenInstitute of Software Chinese Academy of SciencesVerified email at iscas.ac.cn
- Dimitrios PapadopoulosAssociate Professor, HKUSTVerified email at cse.ust.hk
- Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
- Foteini BaldimtsiAssοciate Professor, George Mason UniversityVerified email at gmu.edu
- Ioanna KarantaidouPostdoctoral researcher, CryptographerVerified email at nyu.edu
- Evgenios M. KornaropoulosGeorge Mason UniversityVerified email at gmu.edu