Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
- Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteVerified email at imdea.org
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Yannick SeurinCryptographer at LedgerVerified email at ledger.com
- Russell W. F. LaiAalto UniversityVerified email at aalto.fi
- Jiafan WangCSIRO's Data61Verified email at csiro.au
- Sebastian MeiserUniversity of LübeckVerified email at visa.com
- Esfandiar MohammadiAssociate Professor (W2), Universität zu Lübeck, LübeckVerified email at uni-luebeck.de
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Lisa EckeyVerified email at crisp-da.de
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Neha NarulaMIT Media LabVerified email at mit.edu
- Aviv ZoharThe Hebrew University of JerusalemVerified email at cs.huji.ac.il
- Paul GerhartFriedrich-Alexander Universität Erlangen-NürnbergVerified email at fau.de
- Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
- Sanket KanjalkarResearcherVerified email at squareup.com
- Dominique SchröderFull Professor, Computer Science, TU Wien
- Sri AravindaKrishnan ThyagarajanLecturer at the University of Sydney
- Pieter WuilleChaincode Labs