Get my own profile
Public access
View all19 articles
1 article
available
not available
Based on funding mandates
Co-authors
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
- Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
- Ian BrownResearch ICT AfricaVerified email at researchictafrica.net
- Boris KöpfAzure Research, MicrosoftVerified email at microsoft.com
- Thomas NymanL M EricssonVerified email at ericsson.com
- Shruti TopleAzure Research, MicrosoftVerified email at microsoft.com
- Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
- Arseny KurnikovPhD student, Aalto UniversityVerified email at aalto.fi
- Lukas WutschitzMicrosoftVerified email at microsoft.com
- Victor RuehleMicrosoftVerified email at microsoft.com
- Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
- Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
- Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
- Yoshimichi NakatsukaUniversity of California, IrvineVerified email at uci.edu
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca
- Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
- Guangdong BaiAssociate Professor of The University of QueenslandVerified email at uq.edu.au