Get my own profile
Co-authors
Giuseppe AtenieseStevens Institute of TechnologyVerified email at stevens.edu
Daniele VenturiAssociate Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Sri Aravinda Krishnan ThyagarajanPhD Student at Friedrich Alexander Universität Erlangen-NürnbergVerified email at cs.fau.de
Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Daniel TschudiAarhus UniversityVerified email at cs.au.dk
Ewerton R. AndradeProfessor at Federal University of RondoniaVerified email at andrade.pro.br
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Antonio FaonioEURECOMVerified email at eurecom.fr
Breno de MedeirosSoftware Engineer, Google Inc.Verified email at google.com
Christian MattConcordiumVerified email at concordium.com
Aggelos KiayiasSchool of Informatics, University of Edinburgh, University of Athens & IOHKVerified email at ed.ac.uk
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.saarland
Giulio MalavoltaMax Planck Institute for Security and PrivacyVerified email at csp.mpg.de
Danilo FrancatiPh.D candidate, Stevens Institute of TechnologyVerified email at stevens.edu
Aniket KatePurdue UniversityVerified email at purdue.edu
Adithya BhatPhD Student at Purdue UniversityVerified email at purdue.edu
Thomas Dinsdale-YoungAarhus UniversityVerified email at d-y.me.uk
Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
Claudio OrlandiAssociate Professor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Yashvanth KondiPhD Candidate, Northeastern UniversityVerified email at northeastern.edu