Get my own profile
Public access
View all26 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Francesco RegazzoniUniversity of Amsterdam and Universitā della Svizzera italianaVerified email at alari.ch
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
- Fatih BalliPhD candidate at EPFL ICVerified email at epfl.ch
- avik chakrabortiLecturer at the University of Exeter, UKVerified email at exeter.ac.uk
- Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
- Willi MeierFHNWVerified email at fhnw.ch
- Fukang LiuTokyo Institute of TechnologyVerified email at m.titech.ac.jp
- Serge VaudenayProfessor at EPFLVerified email at epfl.ch
- Sonu Kumar JhaPhD Candidate, NTNU(Trondheim), NorwayVerified email at ntnu.no
- Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Ralph AnkeleRoyal Holloway University of LondonVerified email at live.rhul.ac.uk
- Gaoli WangEast China Normal University, professorVerified email at sei.ecnu.edu.cn
- Daniel CollinsEPFLVerified email at epfl.ch
- Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn