Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
- Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
- Elli AndroulakiIBM ResearchVerified email at zurich.ibm.com
- Angelo De CaroIBM Research - ZurichVerified email at zurich.ibm.com
- Chrysoula StathakopoulouChainlink LabsVerified email at smartcontract.com
- rachid guerraouiProfessor of Computer and Communication Systems, EPFLVerified email at epfl.ch
- Yacov ManevichVerified email at ibm.com
- Artem BargerIBMVerified email at bargr.net
- Christopher FerrisCTO Open Technology, IBMVerified email at us.ibm.com
- Dan DobreEPO, MunichVerified email at dobre.net
- Konstantinos ChristidisNetflix, NCSUVerified email at ncsu.edu
- Manish SethiIBMVerified email at ibm.com
- Vivien QuémaProfessor, Grenoble INP - Ensimag, UGAVerified email at imag.fr
- Paolo ViottiUPMC / LIP6Verified email at lip6.fr
- Robert HaasIBM ResearchVerified email at zurich.ibm.com
- Matej PavlovicProtocol Labs - ConsensusLabVerified email at protocol.ai
- Shengyun LiuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Zsolt IstvánComputer Science Department, TU DarmstadtVerified email at cs.tu-darmstadt.de
- Alysson BessaniLASIGE, Dep. de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at ciencias.ulisboa.pt
- João SousaLASIGE, Departamento de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at fc.ul.pt