Get my own profile
Public access
View all20 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Jan CamenischDFINITYVerified email at dfinity.org
Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
Sören BleikertzResearcher, IBM Research - ZurichVerified email at zurich.ibm.com
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
Charles MorissetAssociate Professor, Durham UniversityVerified email at durham.ac.uk
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Ioannis SfyrakisLecturer in Computer Science, Teesside UniversityVerified email at tees.ac.uk
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Budi AriefUniversity of KentVerified email at kent.ac.uk
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
Luke O'ConnorSecurity Consultant
Follow