Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Karim EldefrawyPrincipal Computer Scientist, SRI InternationalVerified email at sri.com
Ivan De Oliveira NunesAssistant Professor of Computing Security, Rochester Institute of TechnologyVerified email at mail.rit.edu
Xavier CarpentUniversity of NottinghamVerified email at nottingham.ac.uk
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Thomas NymanL M EricssonVerified email at ericsson.com
Sashidhar JakkamsettiUniversity of California, Irvine (UCI)Verified email at uci.edu
Ghada DessoukySystem Security Lab, TU DarmstadtVerified email at trust.tu-darmstadt.de
Ahmad IbrahimCISPAVerified email at cispa.de
Kuljaree TantayakulCollege of Computing, Prince of Songkla UniversityVerified email at phuket.psu.ac.th
Sinchai KamolphiwongPrince of Songkla UniversityVerified email at coe.psu.ac.th
Hideya OchiaiThe University of TokyoVerified email at g.ecc.u-tokyo.ac.jp
Donlapark PonnopratChiang Mai UniversityVerified email at cmu.ac.th
Dr. Hassen SaidiSr Computer Scientist, SRI InternationalVerified email at csl.sri.com
Jakapan SuabootPrince of Songkla UniversityVerified email at phuket.psu.ac.th
Warodom WerapunPrince of Songkla University, Phuket CampusVerified email at phuket.psu.ac.th
Claudio SorienteNEC LabsVerified email at neclab.eu
Alessandro FinamoreHuawei Technologies, FranceVerified email at huawei.com