Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
- Christian SchaffnerUniversity of Amsterdam & QuSoftVerified email at uva.nl
- Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
- Jintai DingTHUVerified email at uc.edu
- Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
- Artur MarianoUniversity of MinhoVerified email at di.uminho.pt
- Sebastian GajekProfessor of Information Security and Cryptography, Flensburg University of Applied SciencesVerified email at hs-flensburg.de
- Bo-Yin YangAcademia SinicaVerified email at moscito.org
- Pierre-Louis CayrelAss. Professor - Université Jean Monnet - Saint-EtienneVerified email at univ-st-etienne.fr
- Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
- Nina BindelSenior Researcher at SandboxAQVerified email at sandboxquantum.com
- David GalindoCTO, Valory AGVerified email at valory.xyz
- Pascal Véronmaître de conférences, Université de ToulonVerified email at univ-tln.fr
- Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
- Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
- Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk