Get my own profile
Public access
View all27 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
Takanori IsobeUniversity of HyogoVerified email at ai.u-hyogo.ac.jp
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Yosuke TodoNTT Social Informatics LaboratoriesVerified email at ntt.com
Fatih BalliPhD candidate at EPFL ICVerified email at epfl.ch
avik chakrabortiAssistant Professor at IAI, TCG CRESTVerified email at tcgcrest.org
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
Fukang LiuTokyo Institute of TechnologyVerified email at m.titech.ac.jp
Willi MeierFHNWVerified email at fhnw.ch
Serge VaudenayProfessor at EPFLVerified email at epfl.ch
Kosei SakamotoMitsubishi Electric CorporationVerified email at dc.MitsubishiElectric.co.jp
Sonu Kumar JhaPhD Candidate, NTNU(Trondheim), NorwayVerified email at ntnu.no
Elmar TischhauserUniversity of MarburgVerified email at mathematik.uni-marburg.de
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Daniel CollinsPurdue UniversityVerified email at purdue.edu
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Ralph AnkeleRoyal Holloway University of LondonVerified email at live.rhul.ac.uk
Gaoli WangEast China Normal University, professorVerified email at sei.ecnu.edu.cn