Get my own profile
Public access
View all21 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Jan CamenischDFINITYVerified email at dfinity.org
- Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
- Sören BleikertzResearcher, IBM Research - ZurichVerified email at zurich.ibm.com
- Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
- Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
- Charles MorissetReader in Security, Newcastle UniversityVerified email at ncl.ac.uk
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
- Ioannis SfyrakisLecturer in Computer Science, Teesside UniversityVerified email at tees.ac.uk
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Budi AriefUniversity of KentVerified email at kent.ac.uk
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- Luke O'ConnorSecurity Consultant
Follow