Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stanislaw JareckiUniversity of California Irvine (UCI)Verified email at uci.edu
- Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
- Julian LossCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
- Tatiana BradleyPhD Candidate, Computer Science, University of California, IrvineVerified email at uci.edu
- Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
- Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECVerified email at fc.up.pt
- Gregory NevenChainlink LabsVerified email at smartcontract.com
- Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
- Jan CamenischDFINITYVerified email at dfinity.org
- Taekyoung KwonYonsei UniversityVerified email at yonsei.ac.kr
- S. Dov GordonGeorge Mason UniversityVerified email at gmu.edu
- Ian McQuoidSecurity Researcher, MIT Lincoln LaboratoryVerified email at oregonstate.edu
- Lawrence RoyPostdoc, Aarhus UniversityVerified email at cs.au.dk
- Mike RosulekAssociate Professor, Oregon State UniversityVerified email at eecs.oregonstate.edu
- Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
- Franklin HardingVerified email at oregonstate.edu