Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
Giuseppe AtenieseGeorge Mason UniversityVerified email at gmu.edu
Daniele VenturiFull Professor, Sapienza University of Rome, ItalyVerified email at di.uniroma1.it
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Daniel TschudiConcordiumVerified email at concordium.com
Christian MattPrimevVerified email at primev.xyz
Dominic DeuberFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Sophia YakoubovAarhus UniversityVerified email at cs.au.dk
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Craig GentryChief Scientist, CornamiVerified email at cornami.com
Shai HaleviSenior Principal Applied Scientist, AWS CryptographyVerified email at alum.mit.edu
Ewerton R. AndradeProfessor at Federal University of RondoniaVerified email at andrade.pro.br
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Aniket KatePurdue University / Supra ResearchVerified email at purdue.edu
Adithya BhatStaff Research Scientist at Visa ResearchVerified email at visa.com
Hugo KrawczykAmazon Web ServicesVerified email at amazon.com
Tal RabinUniversity of Pennsylvania, Amazon Web ServicesVerified email at seas.upenn.edu
Antonio FaonioEURECOMVerified email at eurecom.fr
Breno de MedeirosSoftware Engineer, Google Inc.Verified email at google.com
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Lucjan HanzlikCISPA Helmholtz Center for Information SecurityVerified email at cispa.de