Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Simon MeierPrincipal Architect, Digital AssetVerified email at digitalasset.com
Katriel Cohn-GordonMetaVerified email at katriel.co.uk
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Benedikt SchmidtSnowflakeVerified email at snowflake.com
Dennis JacksonMozillaVerified email at mozilla.com
Kasper RasmussenUniversity of OxfordVerified email at cs.ox.ac.uk
Marko HorvatDepartment of Mathematics, Faculty of Science, University of ZagrebVerified email at math.pmf.unizg.hr
Mang ZhaoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Douglas StebilaUniversity of WaterlooVerified email at uwaterloo.ca
Kevin MilnerQuantinuumVerified email at quantinuum.com
Charlie JacommeUniversité de Lorraine, LORIA, Inria Nancy Grand-EstVerified email at inria.fr
Sam ScottCornell TechVerified email at cornell.edu
Thyla van der MerweRoyal Holloway, University of LondonVerified email at live.rhul.ac.uk
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Kristian GjøsteenNTNUVerified email at ntnu.no
Alexander DaxPhD Student, Saarland University, CISPA Helmholtz Center for Information SecurityVerified email at stud.uni-saarland.de
Erik P. de VinkAssociate Professor, Eindhoven University of TechnologyVerified email at win.tue.nl
Martin Dehnel-WildUniversity of OxfordVerified email at cs.ox.ac.uk