Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Christian CachinUniversity of Bern, Cryptology and Data Security GroupVerified email at inf.unibe.ch
Alessandro SorniottiIBM Research - ZurichVerified email at zurich.ibm.com
Elli AndroulakiIBM ResearchVerified email at zurich.ibm.com
Angelo De CaroÉcole Normale Supérieure, ParisVerified email at ens.fr
rachid guerraouiProfessor of Computer and Communication Systems, EPFLVerified email at epfl.ch
Chrysoula StathakopoulouIBM Research Zurich, ETH ZurichVerified email at zurich.ibm.com
Artem BargerIBMVerified email at bargr.net
Yacov ManevichVerified email at il.ibm.com
Dan DobreEPO, MunichVerified email at dobre.net
Konstantinos ChristidisNetflix, NCSUVerified email at ncsu.edu
Christopher FerrisCTO Open Technology, IBMVerified email at us.ibm.com
Vivien QuémaProfessor, Grenoble INP (ENSIMAG)Verified email at imag.fr
Paolo ViottiUPMC / LIP6Verified email at lip6.fr
Robert HaasIBM ResearchVerified email at zurich.ibm.com
Manish SethiIBMVerified email at ibm.com
Alysson BessaniLASIGE, Dep. de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at ciencias.ulisboa.pt
Zsolt IstvánComputer Science Department, TU DarmstadtVerified email at cs.tu-darmstadt.de
João SousaLASIGE, Departamento de Informática, Faculdade de Ciências da Universidade de LisboaVerified email at fc.ul.pt
Shengyun LiuShanghai JiaoTong UniversityVerified email at sjtu.edu.cn
Partha DuttaLinkedInVerified email at linkedin.com