Get my own profile
Public access
View all38 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Douglas StebilaUniversity of WaterlooVerified email at uwaterloo.ca
Paul RöslerFAU Erlangen-NürnbergVerified email at fau.de
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Nadhem AlFardanRoyal HollowayVerified email at live.rhul.ac.uk
Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenVerified email at box.cr.yp.to
Emiliano De CristofaroProfessor at University of California, RiversideVerified email at ucr.edu
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Jean Paul DegabrieleTechnology Innovation InstituteVerified email at tu-darmstadt.de
Pooya FarshimIOG Research & Durham UniversityVerified email at iohk.io
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
G. GutinProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Naomi FarleyPhD Student of Information Security, Royal Holloway University of LondonVerified email at live.rhul.ac.uk
Benny PinkasBar Ilan UniversityVerified email at biu.ac.il
Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com