Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Roger WattenhoferETH ZurichVerified email at ethz.ch
Yuyi WangETH ZurichVerified email at ethz.chMatteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
Lefteris Kokoris KogiasMystenLabsVerified email at mystenlabs.com
Dionysis ZindrosCommon PrefixVerified email at stanford.edu
Michelle X. YeoNational University of SingaporeVerified email at uchicago.edu
Stefan SchmidProfessor, Computer Science, TU Berlin & Weizenbaum Institute & Fraunhofer SITVerified email at tu-berlin.de
Lioba HeimbachETH ZürichVerified email at ethz.ch
Samarth TiwariPhD student at Centrum Wiskunde & Informatica, Amsterdam, The NetherlandsVerified email at cwi.nl
Iosif SalemResearcher Engineer, ZeroPoint Technologies ABVerified email at zptcorp.com
Alexei ZamyatinDistributed Crafts, Imperial College LondonVerified email at imperial.ac.uk
krzysztof pietrzakProfessor, Cryptography, IST AustriaVerified email at ist.ac.at
Laurent VanbeverProfessor, ETH ZürichVerified email at ethz.ch
Patrick WintermeyerETH ZürichVerified email at alumni.ethz.chIoannis PsarrosPostdoctoral Researcher, Athena Research CenterVerified email at athenarc.gr
Ioannis EmirisAthena Research Center; and National & Kapodistrian University of AthensVerified email at di.uoa.gr
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk