Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sven LaurAssociate Professor in Privacy-Preserving Data Mining, University of TartuVerified email at ut.ee
Janno SiimUniversity of TartuVerified email at simula.no
Michal ZajacNethermindVerified email at nethermind.io
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Bingsheng ZhangZhejiang University, IOHKVerified email at zju.edu.cn
Taneli MielikäinenYahoo!Verified email at yahoo-inc.com
Prastudy FauziResearch Fellow at NTU, SingaporeVerified email at ntu.edu.sg
Peeter LaudCybernetica ASVerified email at cyber.ee
Behzad AbdolmalekiUniversity of Sheffield, United KingdomVerified email at sheffield.ac.uk
Kateryna Pavlykresearcher, University of TartuVerified email at ut.ee
David WagnerProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
Bart GoethalsProfessor of Computer Science, University of AntwerpVerified email at uantwerpen.be
Edith ElkindNorthwestern UniversityVerified email at northwestern.edu
Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
Jan WillemsonSenior researcher, CyberneticaVerified email at cyber.ee
Roberto ParisellaPostdoc, Simula UiBVerified email at simula.no
Qiang TangThe University of SydneyVerified email at sydney.edu.au
Nikos LeonardosUniversity of AthensVerified email at di.uoa.gr
Rafik Chaabouni, PhDCyber Security and CryptographyVerified email at chaabouni.ch