Get my own profile
Public access
View all44 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Thomas CreutzigProfessor of Mathematics at the University of AlbertaVerified email at ualberta.ca
Yasuaki HikidaAssociate Professor, YITP, Kyoto UniversityVerified email at yukawa.kyoto-u.ac.jp
Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
Marie-Laure ZollingerUniversity of LuxembourgVerified email at uni.lu
Thomas HainesAustralian National UniversityVerified email at anu.edu.au
David Duenas-CidAssociate Prof., Public Sector Data-Driven Technologies Research Center, Kozminski UniversityVerified email at kozminski.edu.pl
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Hao ChengProfessor, Shandong UniversityVerified email at sdu.edu.cn
Carine LallemandEindhoven University of Technology & University of LuxembourgVerified email at tue.nl
Verena DistlerAalto UniversityVerified email at aalto.fi
Kristian GjøsteenNTNUVerified email at ntnu.no
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Jan LagerwallUniversity of LuxembourgVerified email at lcsoftmatter.com
Yong Genguniversity of luxembourgVerified email at uni.lu
Alfredo RialUniversity of LuxembourgVerified email at uni.lu
Vincent KoenigUniversity of LuxembourgVerified email at uni.lu
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Wojciech JamrogaPolish Academy of SciencesVerified email at ipipan.waw.pl
Niels ObersNiels Bohr Institute & NorditaVerified email at nbi.dk