Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
Liyi ZhouComputer Science Lecturer (~Assistant Professor) @ The University of SydneyVerified email at sydney.edu.au
Dimitris MitropoulosAssistant Professor, National and Kapodistrian University of AthensVerified email at uoa.gr
Jens ErnstbergerTechnical University of MunichVerified email at tum.de
Thodoris SotiropoulosPostdoctoral researcher, ETH ZurichVerified email at inf.ethz.ch
Diomidis SpinellisProfessor, AUEB and TU DelftVerified email at aueb.gr
Kaihua QinYale UniversityVerified email at qin.ac
Dawn SongProfessor of Computer Science, UC BerkeleyVerified email at cs.berkeley.edu
Roger WattenhoferETH ZurichVerified email at ethz.ch
Rafaila GalanopoulouAthens University of Economics and Business, National and Kapodistrian University of AthensVerified email at aueb.gr
Philipp JovanovicUniversity College LondonVerified email at jovanovic.io
Vaggelis AtlidakisLaceworkVerified email at brown.edu
Michele OrrùCNRSVerified email at berkeley.edu
George KadianakisVerified email at riseup.net
Assimakis KattisNew York UniversityVerified email at cs.nyu.edu
Zhendong SuProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Denis FirsovResearcher at Matter Labs and Tallinn University of TechnologyVerified email at cs.ioc.ee
Follow![Stefanos Chaliasos](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=ZuBDDpIAAAAJ&citpid=1)