Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Hans LiljestrandUniversity of WaterlooVerified email at intel.com
- Andrew PaverdMicrosoftVerified email at microsoft.com
- Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
- Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
- MERVE GÜLMEZKU LeuvenVerified email at kuleuven.be
- Jan Tobias MuehlbergProf. for Embedded Systems Security, Universite Libre de Bruxelles, BelgiumVerified email at ulb.be
- Christoph BaumannSenior Researcher, Ericsson Security Research SwedenVerified email at ericsson.com
- Lachlan J GunnDepartment of Computer Science, Aalto UniversityVerified email at aalto.fi