Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thomas P. JakobsenPhD, Security Architect at BlockdaemonEmail verificata su blockdaemon.com
- Ivan DamgårdProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Kurt NielsenUniversity of CopenhagenEmail verificata su ifro.ku.dk
- Peter BogetoftProfessor, Copenhagen Business SchoolEmail verificata su cbs.dk
- Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Martin GeislerUniversity of AarhusEmail verificata su geisler.net
- Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityEmail verificata su cs.au.dk
- Michael SchwartzbachProfessor of Computer Science, Aarhus UniversityEmail verificata su cs.au.dk
- Yehuda LindellCryptographer at Coinbase; Professor of Computer Science, Bar-Ilan University (on leaveEmail verificata su biu.ac.il
- Dan BogdanovCyberneticaEmail verificata su cyber.ee
- Liina KammSenior researcher at Cybernetica ASEmail verificata su cyber.ee
- Nigel SmartKU LeuvenEmail verificata su kuleuven.be
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Marianne Graves PetersenProfessor, Aarhus UniversityEmail verificata su cs.au.dk
- Dan PageComputer Science, University of BristolEmail verificata su cs.bris.ac.uk
- Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECEmail verificata su fc.up.pt
- Daniel J. BernsteinUniversity of Illinois at Chicago and Technische Universiteit EindhovenEmail verificata su box.cr.yp.to
- Rasmus PaghProfessor of computer science, University of CopenhagenEmail verificata su di.ku.dk
- Lars ArgeProfessor of Computer Science and MADALGO center director, Aarhus UniversityEmail verificata su cs.au.dk
- Klaus Marius HansenMicrosoftEmail verificata su microsoft.com