Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
- Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
- Dimitris MitropoulosAssistant Professor, National and Kapodistrian University of AthensVerified email at uoa.gr
- Liyi ZhouComputer Science Lecturer (~Assistant Professor) @ The University of SydneyVerified email at sydney.edu.au
- Jens ErnstbergerTechnical University of MunichVerified email at tum.de
- Thodoris SotiropoulosPostdoctoral researcher, ETH ZurichVerified email at inf.ethz.ch
- Diomidis SpinellisProfessor, AUEB and TU DelftVerified email at aueb.gr
- Kaihua QinYale UniversityVerified email at qin.ac
- Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
- Roger WattenhoferETH ZurichVerified email at ethz.ch
- Rafaila GalanopoulouAthens University of Economics and Business, National and Kapodistrian University of AthensVerified email at aueb.gr
- Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
- Vaggelis AtlidakisLaceworkVerified email at brown.edu
- Michele OrrùCNRSVerified email at berkeley.edu
- George KadianakisVerified email at riseup.net
- Assimakis KattisNew York UniversityVerified email at cs.nyu.edu
- Zhendong SuProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Denis FirsovResearcher at Matter Labs and Tallinn University of TechnologyVerified email at cs.ioc.ee
Follow