Crea il mio profilo
Accesso pubblico
Visualizza tutto25 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Gregory NevenChainlink LabsEmail verificata su smartcontract.com
Anna LysyanskayaProfessor of Computer Science, Brown UniversityEmail verificata su cs.brown.edu
Anja LehmannHasso Plattner Institute, University of PotsdamEmail verificata su hpi.de
Thomas GroßProfessor of System Security, Newcastle UniversityEmail verificata su ncl.ac.uk
Maria DubovitskayaDFINITY ResearchEmail verificata su dfinity.org
Manu DrijversDFINITYEmail verificata su dfinity.org
Markulf KohlweissUniveristy of EdinburghEmail verificata su ed.ac.uk
Susan HohenbergerJohns Hopkins UniversityEmail verificata su cs.jhu.edu
Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUEmail verificata su shoup.net
Stephan KrennAIT Austrian Institute of Technology GmbHEmail verificata su ait.ac.at
Patrik BichselPrivacy Researcher, IBM Research - Zurich Email verificata su zurich.ibm.com
Christian CachinUniversity of Bern, Cryptology and Data Security GroupEmail verificata su inf.unibe.ch
Michael WaidnerTU Darmstadt, ATHENE, Fraunhofer SITEmail verificata su tu-darmstadt.de
Liqun ChenProfessor, University of Surrey, UKEmail verificata su surrey.ac.uk
Kai SamelinDZ HypEmail verificata su dzhyp.de
Robert R. EnderleinGoogleEmail verificata su e7n.ch
abhi shelatProfessor of Computer ScienceEmail verificata su neu.edu
Giuseppe AtenieseGeorge Mason UniversityEmail verificata su gmu.edu
Günter KarjothLucerne University of Applied SciencesEmail verificata su acm.org
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatEmail verificata su ics.uci.edu