Crea il mio profilo
Accesso pubblico
Visualizza tutto24 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Gregory NevenChainlink LabsEmail verificata su smartcontract.com
- Anna LysyanskayaProfessor of Computer Science, Brown UniversityEmail verificata su cs.brown.edu
- Thomas GroßProfessor of System Security, Newcastle UniversityEmail verificata su ncl.ac.uk
- Anja LehmannHasso Plattner Institute, University of PotsdamEmail verificata su hpi.de
- Maria DubovitskayaDFINITY ResearchEmail verificata su dfinity.org
- Markulf KohlweissUniveristy of EdinburghEmail verificata su ed.ac.uk
- Susan HohenbergerJohns Hopkins UniversityEmail verificata su cs.jhu.edu
- Manu DrijversDFINITYEmail verificata su dfinity.org
- Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUEmail verificata su shoup.net
- Patrik BichselPrivacy Researcher, IBM Research - Zurich Email verificata su zurich.ibm.com
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupEmail verificata su inf.unibe.ch
- Stephan KrennAIT Austrian Institute of Technology GmbHEmail verificata su ait.ac.at
- Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, ATHENE and Fraunhofer SITEmail verificata su sit.fraunhofer.de
- Liqun ChenProfessor, University of Surrey, UKEmail verificata su surrey.ac.uk
- Kai SamelinDZ HypEmail verificata su dzhyp.de
- Robert R. EnderleinGoogleEmail verificata su e7n.ch
- abhi shelatProfessor of Computer ScienceEmail verificata su neu.edu
- Giuseppe AtenieseGeorge Mason UniversityEmail verificata su gmu.edu
- Günter KarjothLucerne University of Applied SciencesEmail verificata su acm.org
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatEmail verificata su ics.uci.edu