Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Kevin LeeJ.P. Morgan AI ResearchVerified email at jpmorgan.com
- Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
- Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
- Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
- Ethan HeilmanBoston University, CloudflareVerified email at bu.edu
- Kyle HoganMITVerified email at mit.edu
- Shashvat SrivastavaVerified email at mit.edu
- Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
- Steven GoldfederCornell TechVerified email at cornell.edu
- Alishah ChatorBoston UniversityVerified email at bu.edu
- Harry KalodnerPrinceton UniversityVerified email at cs.princeton.edu
- Martin PlattnerUniversität Innsbruck, AustriaVerified email at mplattner.at
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
- Ittay EyalAssociate Professor, ECE, TechnionVerified email at technion.ac.il
- Emin Gün SirerCornell UniversityVerified email at systems.cs.cornell.edu
- Syed Taha AliNational University of Science and TechnologyVerified email at seecs.edu.pk