Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Aniket KatePurdue University / Supra ResearchEmail verificata su purdue.edu
- Pedro Moreno-SanchezAssistant Research Professor, IMDEA Software InstituteEmail verificata su imdea.org
- Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergEmail verificata su fau.de
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Yannick SeurinCryptographer at LedgerEmail verificata su ledger.com
- Russell W. F. LaiAalto UniversityEmail verificata su aalto.fi
- Jiafan WangCSIRO's Data61Email verificata su csiro.au
- Sebastian MeiserUniversity of LübeckEmail verificata su visa.com
- Esfandiar MohammadiAssociate Professor (W2), Universität zu Lübeck, LübeckEmail verificata su uni-luebeck.de
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Lisa EckeyEmail verificata su crisp-da.de
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Neha NarulaMIT Media LabEmail verificata su mit.edu
- Aviv ZoharThe Hebrew University of JerusalemEmail verificata su cs.huji.ac.il
- Giulio MalavoltaBocconi UniversityEmail verificata su unibocconi.it
- Sri AravindaKrishnan ThyagarajanPostDoc at NTT Research
- Pieter WuilleChaincode Labs