Get my own profile
Public access
View all24 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Gregory NevenDFINITYVerified email at dfinity.org
Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Victor ShoupPrincipal Researcher, DFINITY; Professor Emeritus, NYUVerified email at dfinity.org
Susan HohenbergerJohns Hopkins UniversityVerified email at cs.jhu.edu
Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Manu DrijversDFINITYVerified email at dfinity.org
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, Fraunhofer SITVerified email at sit.tu-darmstadt.de
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Kai SamelinDZ HypVerified email at dzhyp.de
Robert R. EnderleinGoogleVerified email at e7n.ch
abhi shelatProfessor of Computer ScienceVerified email at neu.edu
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu