Get my own profile
Public access
View all37 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Rafael DowsleyMonash UniversityVerified email at monash.edu
Carsten BaumAssociate Professor, Technical University of DenmarkVerified email at dtu.dk
Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGVerified email at ed.ac.uk
Alexander RussellUniversity of ConnecticutVerified email at cse.uconn.edu
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Anderson C. A. NascimentoHead of Security Research - VisaVerified email at visa.com
Ignacio CascudoAssociate Research Professor, IMDEA Software InstituteVerified email at imdea.org
Rafael Timóteo de Sousa JúniorNetwork Engineering Professor, University of Brasilia (UnB)Verified email at unb.br
Peter GažiIOG ResearchVerified email at iohk.io
Tore Kasper FrederiksenBlockchain Cryptography Engineer, ZamaVerified email at zama.ai
James Hsin-yu ChiangPostdoc, Aarhus UniversityVerified email at ucla.edu
Ryo NishimakiNTT Social Informatics LaboratoriesVerified email at ntt.com
Markulf KohlweissUniveristy of EdinburghVerified email at ed.ac.uk
Mario LarangeiraTokyo Institute of Technology/IOHKVerified email at c.titech.ac.jp
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Sabine OechsnerAssistant Professor at Vrije Universiteit AmsterdamVerified email at vu.nl
Anders KonringIT University CopenhagenVerified email at itu.dk
Lorenzo GentileResearch Engineer at ConsensysVerified email at consensys.net
Melissa ChaseMicrosoft ResearchVerified email at microsoft.com
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Follow![Bernardo David](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=tZghE0kAAAAJ&citpid=2)