Get my own profile
Public access
View all27 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Francesco RegazzoniUniversity of Amsterdam and Universitā della Svizzera italianaVerified email at alari.ch
- Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
- Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
- Fatih BalliPhD candidate at EPFL ICVerified email at epfl.ch
- avik chakrabortiAssistant Professor at IAI, TCG CRESTVerified email at tcgcrest.org
- Fukang LiuTokyo Institute of TechnologyVerified email at m.titech.ac.jp
- Willi MeierFHNWVerified email at fhnw.ch
- Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
- Kosei SakamotoMitsubishi Electric CorporationVerified email at dc.MitsubishiElectric.co.jp
- Serge VaudenayProfessor at EPFLVerified email at epfl.ch
- Sonu Kumar JhaPhD Candidate, NTNU(Trondheim), NorwayVerified email at ntnu.no
- Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- Yuki FunabikiSony CorporationVerified email at sony.com
- Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
- Daniel CollinsPurdue UniversityVerified email at purdue.edu
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
- Ralph AnkeleRoyal Holloway University of LondonVerified email at live.rhul.ac.uk