Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Russell W. F. LaiAalto UniversityVerified email at aalto.fi
Jiafan WangCSIRO's Data61Verified email at csiro.au
Sebastian MeiserUniversity of LübeckVerified email at uni-luebeck.de
Esfandiar MohammadiUniversität zu LübeckVerified email at uni-luebeck.de
Tyler MooreTandy Professor of Cyber Security, School of Cyber Studies, The University of TulsaVerified email at utulsa.edu
Lisa EckeyVerified email at crisp-da.deRainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Neha NarulaMIT Media LabVerified email at mit.edu
Aviv ZoharThe Hebrew University of JerusalemVerified email at cs.huji.ac.il
Paul GerhartTU WienVerified email at tuwien.ac.at
Sanket KanjalkarResearcherVerified email at squareup.com
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.itDominique SchröderFull Professor, Computer Science, TU Wien
Sri Aravinda Krishnan ThyagarajanLecturer at the University of Sydney
Pieter WuilleChaincode Labs