Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Idit KeidarProfessor, TechnionVerified email at ee.technion.ac.il
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Arif MerchantResearch Scientist, GoogleVerified email at google.com
Dahlia malkhiNoviVerified email at fb.com
Kfir Lev-AriAppleVerified email at alumni.technion.ac.il
Edward BortnikovPliopsVerified email at pliops.com
Gregory ChocklerProfessor, University of SurreyVerified email at surrey.ac.uk
Marcos K. AguileraPrincipal Researcher, VMwareVerified email at vmware.com
Maxim GurevichBento LabsVerified email at bentolabs.co
Manya GhobadiMITVerified email at csail.mit.edu
Asaf CidonColumbia UniversityVerified email at columbia.edu
Yan MichalevskyAnjuna SecurityVerified email at anjuna.io
Jennifer RexfordProfessor of Computer Science, Princeton UniversityVerified email at cs.princeton.edu
Nanxi KangPrinceton UniversityVerified email at databricks.com
Atul AdyaGoogleVerified email at google.com
Murray StokelyFacebook, Inc.Verified email at fb.com
Flavio JunqueiraDell EMCVerified email at apache.org
Benjamin ReedSan José State UniversityVerified email at sjsu.edu
Marcus FontouraMicrosoftVerified email at microsoft.com
Vanja JosifovskiCTO, Homes, AirbnbVerified email at airbnb.com