Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sam M. WernerImperial College LondonVerified email at ic.ac.uk
Lewis GudgeonImperial College LondonVerified email at imperial.ac.uk
Benjamin LivshitsReader (Associate Professor++) in Computer ScienceVerified email at imperial.ac.uk
Dominik HarzDistributed CraftsVerified email at imperial.ac.uk
Ariah Klages-MundtPhD student, Cornell UniversityVerified email at cornell.edu
William KnottenbeltProfessor of Applied Quantitative Analysis, Department of Computing, Imperial College LondonVerified email at doc.ic.ac.uk
Jiahua XuComputer Science Department, University College LondonVerified email at ucl.ac.uk
Arthur GervaisProfessor of Information Security (UCL), Affiliate Faculty (UC Berkeley RDI)Verified email at gervais.cc
Paul J. PritzImperial College LondonVerified email at imperial.ac.uk
Shigeru ChibaThe University of TokyoVerified email at acm.org
Alexei ZamyatinDistributed Crafts, Imperial College LondonVerified email at imperial.ac.uk
Zeta (Georgia) AvarikiotiTU Wien & Common PrefixVerified email at tuwien.ac.at
Kin K. LeungTanaka Chair Professor, Imperial CollegeVerified email at imperial.ac.uk
Yebo FengNanyang Technological UniversityVerified email at ntu.edu.sg