Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
Kevin LeePrinceton UniversityVerified email at cs.princeton.edu
Nicolas ChristinAssociate Professor, Carnegie Mellon UniversityVerified email at andrew.cmu.edu
Ethan HeilmanBoston University, BastionZeroVerified email at bu.edu
Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Kyle HoganMITVerified email at mit.edu
Shashvat SrivastavaVerified email at mit.edu
Steven GoldfederCornell TechVerified email at cornell.edu
Alishah ChatorJohns Hopkins UniversityVerified email at cs.jhu.edu
Harry KalodnerPrinceton UniversityVerified email at cs.princeton.edu
Martin PlattnerUniversität Innsbruck, AustriaVerified email at mplattner.at
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Ittay EyalAssistant Professor, EE, TechnionVerified email at technion.ac.il
Emin Gün SirerCornell UniversityVerified email at systems.cs.cornell.edu
Syed Taha AliNational University of Science and TechnologyVerified email at seecs.edu.pk
Patrick McCorryCrypto enthusiast