Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sven LaurAssociate Professor in Privacy-Preserving Data Mining, University of TartuVerified email at ut.ee
- Janno SiimSimula UiBVerified email at simula.no
- Michal ZajacNethermindVerified email at nethermind.io
- Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
- Bingsheng ZhangZhejiang University, IOHKVerified email at zju.edu.cn
- Taneli MielikäinenYahoo!Verified email at yahoo-inc.com
- Prastudy FauziResearch Fellow at NTU, SingaporeVerified email at ntu.edu.sg
- Peeter LaudCybernetica ASVerified email at cyber.ee
- Behzad AbdolmalekiUniversity of Sheffield, United KingdomVerified email at sheffield.ac.uk
- Kateryna Pavlykresearcher, University of TartuVerified email at ut.ee
- David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
- Bart GoethalsProfessor of Computer Science, University of AntwerpVerified email at uantwerpen.be
- Edith ElkindUniversity of OxfordVerified email at cs.ox.ac.uk
- Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
- Jan WillemsonSenior researcher, CyberneticaVerified email at cyber.ee
- Qiang TangThe University of SydneyVerified email at sydney.edu.au
- Nikos LeonardosUniversity of AthensVerified email at di.uoa.gr
- Rafik Chaabouni, PhDCyber Security and CryptographyVerified email at chaabouni.ch
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca