Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Stanislaw JareckiUniversity of California Irvine (UCI)Verified email at uci.edu
Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
Julian LossCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Julia KastnerCWIVerified email at cwi.nl
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECVerified email at fc.up.pt
Gregory NevenChainlink LabsVerified email at smartcontract.com
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Jan CamenischDFINITYVerified email at dfinity.org
Taekyoung KwonYonsei UniversityVerified email at yonsei.ac.kr
Ian McQuoidSecurity Researcher, MIT Lincoln LaboratoryVerified email at oregonstate.edu
S. Dov GordonGeorge Mason UniversityVerified email at gmu.edu
Lawrence RoyPostdoc, Aarhus UniversityVerified email at cs.au.dk
Mike RosulekAssociate Professor, Oregon State UniversityVerified email at eecs.oregonstate.edu
Jake JanuzelliOregon State UniversityVerified email at oregonstate.edu
Chris PeikertProfessor, Computer Science and Engineering, University of MichiganVerified email at alum.mit.edu
Franklin HardingPhD Student, Brown UniversityVerified email at brown.edu