Get my own profile
Co-authors
- Günter KarjothLucerne University of Applied SciencesVerified email at acm.org
- Rosario GennaroProfessor of Computer Science, City College of New YorkVerified email at cs.ccny.cuny.edu
- Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
- Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
- Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Mohammad Peyravian, Ph.D.Senior Technical Staff Member at IBMVerified email at us.ibm.com
- Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
- Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- Tyrone GrandisonFounder, The Data-Driven InstituteVerified email at data-driven.institute
- Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
- Zoran MilosevicDeontikVerified email at deontik.com
- Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
- Andrew KlapperProfessor of Computer Science, University of KentuckyVerified email at cs.uky.edu
- Jonathan PoritzVerified email at poritz.net
- Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au