Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Thyla van der MerweRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
Marko HorvatDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Rachel PlayerRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
Adam EverspaughApplied cryptographer at CoinbaseVerified email at coinbase.com
Jonathan HoylandRoyal HollowayVerified email at live.rhul.ac.uk
Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonVerified email at cs.wisc.edu
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Simon R. BlackburnRoyal Holloway University of LondonVerified email at rhul.ac.uk