Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sven LaurAssociate Professor in Privacy-Preserving Data Mining, University of TartuVerified email at ut.ee
Janno SiimSimula UiBVerified email at simula.no
Michal ZajacNethermindVerified email at nethermind.io
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Taneli MielikäinenYahoo!Verified email at yahoo-inc.com
Bingsheng ZhangZhejiang University, IOHKVerified email at zju.edu.cn
Prastudy FauziResearch Fellow at NTU, SingaporeVerified email at ntu.edu.sg
Peeter LaudCybernetica ASVerified email at cyber.ee
Behzad AbdolmalekiUniversity of Sheffield, United KingdomVerified email at sheffield.ac.uk
Kateryna PavlykSimula UiBVerified email at simula.no
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
Bart GoethalsProfessor of Computer Science, University of AntwerpVerified email at uantwerpen.be
Edith ElkindUniversity of OxfordVerified email at cs.ox.ac.uk
Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
Qiang TangThe University of SydneyVerified email at sydney.edu.au
Nikos LeonardosUniversity of AthensVerified email at di.uoa.gr
Rafik Chaabouni, PhDCyber Security and CryptographyVerified email at chaabouni.ch
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Berry SchoenmakersAssociate Professor, TU EindhovenVerified email at tue.nl