Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Gregory NevenChainlink LabsVerified email at smartcontract.com
- Anna LysyanskayaProfessor of Computer Science, Brown UniversityVerified email at cs.brown.edu
- Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
- Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
- Maria DubovitskayaDFINITY ResearchVerified email at dfinity.org
- Manu DrijversDFINITYVerified email at dfinity.org
- Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
- Susan HohenbergerJohns Hopkins UniversityVerified email at cs.jhu.edu
- Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
- Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
- Patrik BichselPrivacy Researcher, IBM Research - Zurich Verified email at zurich.ibm.com
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
- Michael WaidnerTU Darmstadt, ATHENE, Fraunhofer SITVerified email at tu-darmstadt.de
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Kai SamelinDZ HypVerified email at dzhyp.de
- Robert R. EnderleinGoogleVerified email at e7n.ch
- abhi shelatProfessor of Computer ScienceVerified email at neu.edu
- Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
- Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu