Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
- María Naya-PlasenciaINRIA ParisVerified email at inria.fr
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- Avijit DuttaInstitute for Advancing Intelligence, TCG-CRESTVerified email at tcgcrest.org
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Xavier BonnetainInria, CNRS, Université de LorraineVerified email at inria.fr
- Gaëtan LeurentINRIAVerified email at inria.fr
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Yaobin ShenXiamen UniversityVerified email at xmu.edu.cn
- Dan PageComputer Science, University of BristolVerified email at cs.bris.ac.uk
- Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
- Martijn StamSenior Researcher at Simula UiB, NorwayVerified email at simula.no
- Nicky MouhaResearcher, NISTVerified email at nist.gov
- NILanjan DattaInstitute for Advancing Intelligence, TCG CRESTVerified email at tcgcrest.org