Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Roberto TamassiaPlastech Professor of Computer Science, Brown UniversityVerified email at cs.brown.edu
Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
Cédric FournetMicrosoft ResearchVerified email at microsoft.com
Bryan ParnoCarnegie Mellon UniversityVerified email at cmu.edu
Dario FioreAssociate Research Professor, IMDEA Software InstituteVerified email at imdea.org
Dimitrios PapadopoulosHong Kong University of Science and TechnologyVerified email at cse.ust.hk
Fahad PanolanIndian Institute of Technology HyderabadVerified email at iith.ac.in
Ashutosh RaiCharles University, PragueVerified email at kam.mff.cuni.cz
Ramanujan M. S.University of Warwick, UKVerified email at warwick.ac.uk
Sudeshna KolayIIT KharagpurVerified email at cse.iitkgp.ac.in
Pranabendu MisraAssistant Professor at Chennai Mathematical InstituteVerified email at cmi.ac.in
Michael T. GoodrichProfessor of Computer Science, University of California, IrvineVerified email at uci.edu
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Saeed MahloujifarPrinceton UniversityVerified email at princeton.edu
Nikos TriandopoulosBoston UniversityVerified email at cs.bu.edu
Angelo De CaroÉcole Normale Supérieure, ParisVerified email at ens.fr
Jan CamenischDFINITYVerified email at dfinity.org
C.Pandu RanganProfessor, Department of Computer Science and Engg, IIT-Madras, India.Verified email at cse.iitm.ac.in
Björn TackmannDFINITYVerified email at dfinity.org
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch