Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Christian SchaffnerUniversity of Amsterdam & QuSoftVerified email at uva.nl
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Jintai DingTHUVerified email at uc.edu
Dan BonehProfessor of Computer Science, Stanford UniversityVerified email at cs.stanford.edu
Artur MarianoUniversity of MinhoVerified email at di.uminho.pt
Sebastian GajekProfessor of Information Security and Cryptography, Flensburg University of Applied SciencesVerified email at hs-flensburg.de
Bo-Yin YangAcademia SinicaVerified email at moscito.org
Pierre-Louis CayrelAss. Professor - Université Jean Monnet - Saint-EtienneVerified email at univ-st-etienne.fr
Erdem ALKIMDokuz Eylul University, Izmir, TurkeyVerified email at deu.edu.tr
Nina BindelSenior Researcher at SandboxAQVerified email at sandboxquantum.com
David GalindoCTO, Valory AGVerified email at valory.xyz
Pascal Véronmaître de conférences, Université de ToulonVerified email at univ-tln.fr
Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyVerified email at uol.de
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk