Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Ian BrownResearch ICT AfricaVerified email at researchictafrica.net
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Thomas NymanL M EricssonVerified email at ericsson.com
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Arseny KurnikovPhD student, Aalto UniversityVerified email at aalto.fi
Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
Boris KöpfMicrosoft ResearchVerified email at microsoft.com
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Ghada DessoukySystem Security Lab, TU DarmstadtVerified email at trust.tu-darmstadt.de
Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
Shruti TopleMicrosoft ResearchVerified email at microsoft.com
Victor RuehleVerified email at microsoft.com
Fritz Alderimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Jin Song DongProfessor of Computer Science, National University of SingaporeVerified email at nus.edu.sg
Guangdong BaiAssociate Professor of The University of QueenslandVerified email at uq.edu.au
Yun LinAssociate Professor, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Pardeep kumarSwansea UniversityVerified email at swansea.ac.uk