Get my own profile
Public access
View all20 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jesper Buus NielsenProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
Thomas P. JakobsenPhD, Security Architect at BlockdaemonVerified email at blockdaemon.com
Carsten BaumAssociate Professor, Technical University of DenmarkVerified email at dtu.dk
Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
Claudio OrlandiProfessor, Department of Computer Science, Aarhus University, DenmarkVerified email at cs.au.dk
Marcel KellerCSIRO's Data61Verified email at data61.csiro.au
Peter SchollAarhus UniversityVerified email at cs.au.dk
Ivan DamgårdProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
James Hsin-yu ChiangPostdoc, Aarhus UniversityVerified email at ucla.edu
Anja LehmannHasso Plattner Institute, University of PotsdamVerified email at hpi.de
Roberto TrifilettiPhD Student, Aarhus UniversityVerified email at cs.au.dk
Benny PinkasBar Ilan UniversityVerified email at biu.ac.il
Nikolaj VolgushevPreviously at the Alexandra InstituteVerified email at bu.edu
Peter Sebastian NordholtChainalysisVerified email at chainalysis.com