Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
Avijit DuttaInstitute for Advancing Intelligence, TCG-CRESTVerified email at tcgcrest.org
Ashwin JhaRuhr-Universität BochumVerified email at ruhr-uni-bochum.de
María Naya-PlasenciaINRIA ParisVerified email at inria.frEik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Yaobin ShenXiamen UniversityVerified email at xmu.edu.cn
Bart MenninkDepartment of Advanced Computing Sciences, Maastricht UniversityVerified email at maastrichtuniversity.nl
André SchrottenloherInriaVerified email at inria.fr
Xavier BonnetainInria, CNRS, Université de LorraineVerified email at inria.frGaëtan LeurentINRIAVerified email at inria.fr
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org
Wonseok ChoiDGISTVerified email at dgist.ac.kr
Daniel PageSchool of Computer Science, University of BristolVerified email at cs.bris.ac.uk
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Martijn StamChief Research Scientist at Simula UiB, NorwayVerified email at simula.no
Nicky MouhaResearcher, NISTVerified email at nist.gov
Kazuhiko MinematsuNEC CorporationVerified email at nec.comStefano TessaroProfessor, Paul G. Allen School of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
Jérôme GovindenResearcher, Technology Innovation InstituteVerified email at tii.ae