Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Hans LiljestrandUniversity of WaterlooVerified email at intel.com
Andrew PaverdMicrosoftVerified email at microsoft.com
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
MERVE GÜLMEZKU LeuvenVerified email at kuleuven.be
Jan Tobias MuehlbergProf. for Embedded Systems Security, Universite Libre de Bruxelles, BelgiumVerified email at ulb.be
Christoph BaumannSenior Researcher, Ericsson Security Research SwedenVerified email at ericsson.com
Lachlan J GunnDepartment of Computer Science, Aalto UniversityVerified email at aalto.fi