Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Thomas P. JakobsenPhD, Security Architect at BlockdaemonVerified email at blockdaemon.com
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Carsten BaumAssociate Professor, Technical University of DenmarkVerified email at dtu.dk
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Peter SchollAarhus UniversityVerified email at cs.au.dk
James Hsin-yu ChiangPostdoc, Aarhus UniversityVerified email at ucla.edu
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Roberto TrifilettiPhD Student, Aarhus UniversityVerified email at cs.au.dk
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Benny PinkasBar Ilan University and Aptos LabsVerified email at biu.ac.il
Nikolaj VolgushevPreviously at the Alexandra InstituteVerified email at bu.edu
Peter Sebastian NordholtChainalysisVerified email at chainalysis.com