Crea il mio profilo
Accesso pubblico
Visualizza tutto30 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGEmail verificata su ed.ac.uk
- Alexander RussellUniversity of ConnecticutEmail verificata su cse.uconn.edu
- krzysztof pietrzakProfessor, Cryptography, IST AustriaEmail verificata su ist.ac.at
- Christian BadertscherInput Output (IOG) & Zurich University of Applied Sciences (ZHAW)Email verificata su iohk.io
- Georg FuchsbauerTU WienEmail verificata su ist.ac.at
- Sunoo ParkMITEmail verificata su csail.mit.edu
- Vassilis ZikasPurdue UniversityEmail verificata su cs.purdue.edu
- Ueli MaurerProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Stefano TessaroProfessor at the University of WashingtonEmail verificata su cs.washington.edu
- Bernardo DavidAssociate Professor, IT University of CopenhagenEmail verificata su itu.dk
- Aljosha JudmayerPhD Student at TU Wien, researcher at University of Vienna & SBA ResearchEmail verificata su 3-volution.net
- Nicholas StifterSBA Research, University of ViennaEmail verificata su alumni.tuwien.ac.at
- Itay TsabaryPhD Candidate, Technion, IsraelEmail verificata su campus.technion.ac.il
- Alexei ZamyatinDistributed Crafts, Imperial College LondonEmail verificata su imperial.ac.uk
- Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchEmail verificata su univie.ac.at
- Sarah MeiklejohnProfessor at University College LondonEmail verificata su ucl.ac.uk
- Ittay EyalAssociate Professor, ECE, TechnionEmail verificata su technion.ac.il
- Matthias FitziIOHKEmail verificata su iohk.io
- Dionysis ZindrosCommon PrefixEmail verificata su stanford.edu
- Grégory DemaySenior Software Engineer, DFINITYEmail verificata su dfinity.org