Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Elli AndroulakiIBM ResearchVerified email at zurich.ibm.com
Angelo De CaroIBM Research - ZurichVerified email at zurich.ibm.com
Chrysoula StathakopoulouChainlink LabsVerified email at smartcontract.com
rachid guerraouiProfessor of Computer and Communication Systems, EPFLVerified email at epfl.ch
Yacov ManevichVerified email at ibm.com
Artem BargerIBMVerified email at bargr.net
Christopher FerrisCTO Open Technology, IBMVerified email at us.ibm.com
Dan DobreEPO, MunichVerified email at dobre.net
Konstantinos ChristidisNetflix, NCSUVerified email at ncsu.edu
Manish SethiIBMVerified email at ibm.com
Vivien QuémaProfessor, Grenoble INP - Ensimag, UGAVerified email at imag.fr
Paolo ViottiUPMC / LIP6Verified email at lip6.fr
Robert HaasIBM ResearchVerified email at zurich.ibm.com
Matej PavlovicNear OneVerified email at nearone.org
Shengyun LiuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Zsolt IstvánComputer Science Department, TU DarmstadtVerified email at cs.tu-darmstadt.de
Alysson BessaniLASIGE, Dep. de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at ciencias.ulisboa.pt
João SousaLASIGE, Departamento de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at fc.ul.pt