Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Sri AravindaKrishnan ThyagarajanPhD Student at Friedrich Alexander Universität Erlangen-NürnbergVerified email at cs.fau.de
Daniel TschudiConcordiumVerified email at concordium.com
Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Christian MattConcordiumVerified email at concordium.com
Ewerton R. AndradeProfessor at Federal University of RondoniaVerified email at andrade.pro.br
Antonio FaonioEURECOMVerified email at eurecom.fr
Breno de MedeirosSoftware Engineer, Google Inc.Verified email at google.com
Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Giulio MalavoltaMax Planck Institute for Security and PrivacyVerified email at csp.mpg.de
Craig GentryCTO TripleBlindVerified email at tripleblind.ai
Shai HaleviResearch Fellow, Algorand FoundationVerified email at alum.mit.edu
Aggelos KiayiasSchool of Informatics, University of Edinburgh, University of Athens & IOHKVerified email at ed.ac.uk
Yiannis TselekounisCarnegie Mellon University, School of Computer ScienceVerified email at cs.cmu.edu
Aniket KatePurdue UniversityVerified email at purdue.edu
Adithya BhatPhD Student at Purdue UniversityVerified email at purdue.edu
Danilo FrancatiPostdoctoral researcher, Aarhus UniversityVerified email at cs.au.dk