Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David BasinProfessor of Computer Science, ETH Zurich; Affiliated Faculty, INSAIT, Sofia UniversityVerified email at inf.ethz.ch
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Simon MeierPrincipal Architect, Digital AssetVerified email at digitalasset.com
Katriel Cohn-GordonMetaVerified email at katriel.co.uk
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Dennis JacksonMozillaVerified email at mozilla.com
Benedikt SchmidtSnowflakeVerified email at snowflake.com
Mang ZhaoWuhan UniversityVerified email at whu.edu.cn
Kasper RasmussenUniversity of OxfordVerified email at cs.ox.ac.ukMarko HorvatDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
Alexander DaxPhD Student, Saarland University, CISPA Helmholtz Center for Information SecurityVerified email at stud.uni-saarland.de
Douglas StebilaUniversity of WaterlooVerified email at uwaterloo.ca
Charlie JacommeUniversité de Lorraine, LORIA, Inria Nancy Grand-EstVerified email at inria.frKevin MilnerQuantinuumVerified email at quantinuum.com
Sam ScottCornell TechVerified email at cornell.eduThyla van der MerweRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
Niklas MedingerCISPAVerified email at cispa.de
Kristian GjøsteenNTNUVerified email at ntnu.noMartin Dehnel-WildUniversity of OxfordVerified email at cs.ox.ac.uk