Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Kevin LeeJ.P. Morgan AI ResearchVerified email at jpmorgan.com
Dominic BreukerInstitute for Information Systems, University of MünsterVerified email at ercis.de
Andrew MillerUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Nicolas ChristinCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Ethan HeilmanBoston University, CloudflareVerified email at bu.edu
Kyle HoganMITVerified email at mit.edu
Shashvat SrivastavaVerified email at mit.edu
Patrick McCorryCrypto enthusiastVerified email at arbitrum.foundation
Steven GoldfederCornell TechVerified email at cornell.edu
Alishah ChatorBoston UniversityVerified email at bu.edu
Harry KalodnerPrinceton UniversityVerified email at cs.princeton.edu
Martin PlattnerUniversität Innsbruck, AustriaVerified email at mplattner.at
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Siamak F. ShahandashtiUniversity of York, UKVerified email at york.ac.uk
Ittay EyalAssociate Professor, ECE, TechnionVerified email at technion.ac.il
Emin Gün SirerCornell UniversityVerified email at systems.cs.cornell.edu
Syed Taha AliNational University of Science and TechnologyVerified email at seecs.edu.pk