Get my own profile
Public access
View all25 articles
28 articles
available
not available
Based on funding mandates
Co-authors
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Jan CamenischDFINITYVerified email at dfinity.org
Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
amir herzbergDept. of Computer Science and Engineering, University of ConnecticutVerified email at uconn.edu
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
Juan GarayProfessor, Texas A&M University, Computer Science & EngineeringVerified email at TAMU.EDU
Mihir BellareProfessor, Dept. of Computer Science and Engineering, University of California San Diego (UCSD)Verified email at ucsd.edu
Jonathan PoritzVerified email at poritz.net
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Philipp JeitnerFraunhofer Institute for Secure Information Technology (SIT)Verified email at sit.fraunhofer.de
Ralf HauserCTO PrivaSphere AGVerified email at acm.org
Yves DeswarteResearcher, LAAS-CNRSVerified email at laas.fr
Marco GhiglieriTechnische Universität DarmstadtVerified email at crisp-da.de
Amit KleinThe Hebrew University of Jerusalem, Israel (HUJI)Verified email at cs.huji.ac.il
Charles PalmerIBMVerified email at us.ibm.com
Follow