Get my own profile
Public access
View all17 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sven LaurAssociate Professor in Privacy-Preserving Data Mining, University of TartuVerified email at ut.ee
Janno SiimSimula UiBVerified email at simula.no
Michal ZajacNethermindVerified email at nethermind.io
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Taneli MielikäinenYahoo!Verified email at yahoo-inc.com
Bingsheng ZhangZhejiang University, IOHKVerified email at zju.edu.cn
Peeter LaudCybernetica ASVerified email at cyber.ee
Prastudy FauziResearch Fellow at NTU, SingaporeVerified email at ntu.edu.sg
Behzad AbdolmalekiUniversity of Sheffield, United KingdomVerified email at sheffield.ac.uk
Kateryna PavlykSimula UiBVerified email at simula.no
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
Bart GoethalsProfessor of Computer Science, University of AntwerpVerified email at uantwerpen.be
Edith ElkindUniversity of OxfordVerified email at cs.ox.ac.uk
Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
Jan WillemsonSenior researcher, CyberneticaVerified email at cyber.ee
Qiang TangThe University of SydneyVerified email at sydney.edu.au
Nikos LeonardosUniversity of AthensVerified email at di.uoa.gr
Rafik Chaabouni, PhDCyber Security and CryptographyVerified email at chaabouni.ch
Berry SchoenmakersAssociate Professor, TU EindhovenVerified email at tue.nl