Get my own profile
Public access
View all64 articles
1 article
available
not available
Based on funding mandates
Co-authors
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.itSanjam GargUniversity of California, BerkeleyVerified email at berkeley.edu
Jörn Müller-QuadeProfessor für Informatik, Karlsruhe Institute of TechnologyVerified email at kit.edu
Pedro BrancoBocconi UniversityVerified email at unibocconi.it
Zvika BrakerskiWeizmann Institute of ScienceVerified email at weizmann.ac.ilSihang PuCNRSVerified email at irif.fr
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Lucjan HanzlikCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Daniel MasnyMetaVerified email at fb.com
Jesko DujmovicNortheastern University & Boston UniversityVerified email at northeastern.edu
Tamer MourBocconi UniversityVerified email at unibocconi.itMaciej ObremskiNational University of SingaporeVerified email at nus.edu.sg
Peihan MiaoBrown UniversityVerified email at brown.edu
Divya GuptaPrincipal Researcher, Microsoft Research IndiaVerified email at microsoft.com
Anderson C. A. NascimentoSr. Director at Visa Research - VisaVerified email at visa.com
Akshayaram SrinivasanUniversity of TorontoVerified email at cs.toronto.edu
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland