Get my own profile
Public access
View all25 articles
28 articles
available
not available
Based on funding mandates
Co-authors
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Jan CamenischDFINITYVerified email at dfinity.org
Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
amir herzbergDept. of Computer Science and Engineering, University of ConnecticutVerified email at uconn.edu
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
Jonathan PoritzVerified email at poritz.net
Philipp JeitnerFraunhofer Institute for Secure Information Technology (SIT)Verified email at sit.fraunhofer.de
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Ralf HauserCTO PrivaSphere AGVerified email at acm.org
Yves DeswarteResearcher, LAAS-CNRSVerified email at laas.fr
Haya SchulmannProfessor of computer science | Goethe-Universität Frankfurt | ATHENE CenterVerified email at em.uni-frankfurt.de
Marco GhiglieriTechnische Universität DarmstadtVerified email at crisp-da.de
Amit KleinThe Hebrew University of Jerusalem, Israel (HUJI)Verified email at cs.huji.ac.il
Follow