Get my own profile
Public access
View all23 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Gregory NevenDFINITYVerified email at dfinity.org
Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Thomas GroßReader in System Security, Newcastle UniversityVerified email at ncl.ac.uk
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
Victor ShoupPrincipal Researcher, DFINITY; Professor, NYU (on leave)Verified email at dfinity.org
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Susan HohenbergerJohns Hopkins UniversityVerified email at cs.jhu.edu
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, Fraunhofer SITVerified email at sit.tu-darmstadt.de
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Manu DrijversDFINITYVerified email at dfinity.org
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Robert R. EnderleinGoogleVerified email at e7n.ch
Kai SamelinDräxlmaier GroupVerified email at draexlmaier.com
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Marc JoyeZamaVerified email at zama.ai