Get my own profile
Public access
View all24 articles
28 articles
available
not available
Based on funding mandates
Co-authors
- Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
- Jan CamenischDFINITYVerified email at dfinity.org
- Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
- amir herzbergDept. of Computer Science and Engineering, University of ConnecticutVerified email at uconn.edu
- Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
- Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
- Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
- Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
- Jonathan PoritzVerified email at poritz.net
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
- Philipp JeitnerFraunhofer Institute for Secure Information Technology (SIT)Verified email at sit.fraunhofer.de
- Ralf HauserCTO PrivaSphere AGVerified email at acm.org
- Yves DeswarteResearcher, LAAS-CNRSVerified email at laas.fr
- Marco GhiglieriTechnische Universität DarmstadtVerified email at crisp-da.de
- Amit KleinThe Hebrew University of Jerusalem, Israel (HUJI)Verified email at cs.huji.ac.il
- Charles PalmerIBMVerified email at us.ibm.com
Follow