Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Yannick SeurinCryptographer at LedgerVerified email at ledger.com
Russell W. F. LaiAalto UniversityVerified email at aalto.fi
Jiafan WangCSIRO's Data61Verified email at csiro.au
Sebastian MeiserUniversity of LübeckVerified email at visa.com
Esfandiar MohammadiAssociate Professor (W2), Universität zu Lübeck, LübeckVerified email at uni-luebeck.de
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Lisa EckeyVerified email at crisp-da.de
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Neha NarulaMIT Media LabVerified email at mit.edu
Aviv ZoharThe Hebrew University of JerusalemVerified email at cs.huji.ac.il
Paul GerhartTU WienVerified email at tuwien.ac.at
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Sanket KanjalkarResearcherVerified email at squareup.com
Dominique SchröderFull Professor, Computer Science, TU Wien
Sri AravindaKrishnan ThyagarajanLecturer at the University of Sydney
Pieter WuilleChaincode Labs