Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.itAniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Bernardo MagriThe University of ManchesterVerified email at manchester.ac.uk
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Russell W. F. LaiAalto UniversityVerified email at aalto.fi
Nico DöttlingHelmholtz Center for Information Security (CISPA)Verified email at cispa.de
Adithya BhatStaff Research Scientist at Visa ResearchVerified email at visa.com
Tim RuffingVerified email at real-or-random.org
Pratik SoniAssistant Professor, Kahlert School of Computing, University of UtahVerified email at cs.utah.edu
Lucjan HanzlikCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
Pratyay MukherjeeHashgraphVerified email at hashgraph.com
Elisaweta MasserovaCBI Postdoctoral Research Fellow, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Easwar Vivek MangipudiSupra ResearchVerified email at supraoracles.comJiafan WangCSIRO's Data61Verified email at csiro.au
Daniel TschudiConcordiumVerified email at concordium.comElaine ShiCarnegie Mellon UniversityVerified email at cs.cmu.edu
Lukas AumayrResearch Associate, University of Edinburgh and Common PrefixVerified email at ed.ac.uk
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk