Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Gregory NevenChainlink LabsVerified email at smartcontract.com
Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.deThomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.orgManu DrijversDFINITYVerified email at dfinity.org
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
Susan HohenbergerJohns Hopkins UniversityVerified email at cs.jhu.edu
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.atPatrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.chMichael WaidnerTU Darmstadt, ATHENE, Fraunhofer SITVerified email at tu-darmstadt.de
Kai SamelinDZ HypVerified email at dzhyp.de
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Robert R. EnderleinGoogleVerified email at e7n.ch
abhi shelatProfessor of Computer ScienceVerified email at neu.eduGiuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Gene Tsudik (it/it/its)Peter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu