Get my own profile
Co-authors
Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
Rosario GennaroProfessor of Computer Science, City College of New YorkVerified email at cs.ccny.cuny.edu
Shai HaleviResearch Fellow, Algorand FoundationVerified email at alum.mit.edu
Victor ShoupPrincipal Researcher, DFINITY; Professor, NYU (on leave)Verified email at dfinity.org
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
Mohammad Peyravian, Ph.D.Senior Technical Staff Member at IBMVerified email at us.ibm.com
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Josef PieprzykCSIRO Data61Verified email at csiro.au
Tyrone GrandisonFounder, The Data-Driven InstituteVerified email at data-driven.institute
Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Zoran MilosevicDeontikVerified email at deontik.com
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Andrew KlapperProfessor of Computer Science, University of KentuckyVerified email at cs.uky.edu
Jonathan PoritzAssociate Professor of Mathematics, Colorado State University - PuebloVerified email at colostate-pueblo.edu
Thomas GroßReader in System Security, Newcastle UniversityVerified email at ncl.ac.uk
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au