Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Russell W. F. LaiAalto UniversityVerified email at aalto.fi
Jiafan WangCSIRO's Data61Verified email at csiro.au
Sebastian MeiserUniversity of LübeckVerified email at visa.com
Esfandiar MohammadiAssociate Professor (W2), Universität zu Lübeck, LübeckVerified email at uni-luebeck.de
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Lisa EckeyVerified email at crisp-da.de
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Neha NarulaMIT Media LabVerified email at mit.edu
Aviv ZoharThe Hebrew University of JerusalemVerified email at cs.huji.ac.il
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Sri AravindaKrishnan ThyagarajanLecturer at the University of Sydney
Pieter WuilleChaincode Labs