Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Thyla van der MerweRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
- Marko HorvatDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
- Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
- Rachel PlayerRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Thomas RistenpartProfessor of Computer Science, Cornell TechVerified email at cornell.edu
- Adam EverspaughApplied cryptographer at CoinbaseVerified email at coinbase.com
- Jonathan HoylandRoyal HollowayVerified email at live.rhul.ac.uk
- Ari JuelsProfessor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3Verified email at cornell.edu
- Rahul ChatterjeeAssistant Professor at University of Wisconsin--MadisonVerified email at cs.wisc.edu
- Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Simon R. BlackburnRoyal Holloway University of LondonVerified email at rhul.ac.uk