Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Gregory NevenChainlink LabsVerified email at smartcontract.com
Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
Manu DrijversDFINITYVerified email at dfinity.org
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Susan HohenbergerJohns Hopkins UniversityVerified email at cs.jhu.edu
Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Michael WaidnerTU Darmstadt, ATHENE, Fraunhofer SITVerified email at tu-darmstadt.de
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Kai SamelinDZ HypVerified email at dzhyp.de
Robert R. EnderleinGoogleVerified email at e7n.ch
abhi shelatProfessor of Computer ScienceVerified email at neu.edu
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu