Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
David NuñezCryptography R&D at NuCypher Inc.Verified email at nucypher.com
Dario PasquiniGeorge Mason UniversityVerified email at gmu.edu
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Daniele FrioloAssistant Professor at Sapienza University of RomeVerified email at di.uniroma1.it
Luca SchiattiAccenture LabsVerified email at accenture.com
Boaz BarakHarvard UniversityVerified email at boazbarak.org
Benjamin L. EdelmanHarvard UniversityVerified email at g.harvard.edu
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Hanlin ZhangHarvard UniversityVerified email at g.harvard.edu
Luigi RussoEURECOMVerified email at eurecom.fr
Ahmadreza RahimiMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Monosij MaitraIIT KharagpurVerified email at cse.iitkgp.ac.in
Long ChenInstitute of Software Chinese Academy of SciencesVerified email at iscas.ac.cn
Dimitrios PapadopoulosAssociate Professor, HKUSTVerified email at cse.ust.hk
Matteo CampanelliMatter LabsVerified email at matterlabs.dev
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Evgenios M. KornaropoulosGeorge Mason UniversityVerified email at gmu.edu
Qiang TangThe University of SydneyVerified email at sydney.edu.au
Follow![Danilo Francati](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=eeuQ0a0AAAAJ&citpid=1)