Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ian BrownResearch ICT AfricaVerified email at researchictafrica.net
Thomas NymanL M EricssonVerified email at ericsson.com
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
Arseny KurnikovPhD student, Aalto UniversityVerified email at aalto.fi
Ghada DessoukySystem Security Lab, TU DarmstadtVerified email at trust.tu-darmstadt.de
Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
Boris KöpfMicrosoft ResearchVerified email at microsoft.com
Klaudia KrawieckaCDT in Cyber Security, University of Oxford, UKVerified email at cs.ox.ac.uk
Mohammad MannanAssociate Professor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca
Fritz Alderimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Samarjit ChakrabortyKenan Professor of Computer Science, The University of North Carolina at Chapel HillVerified email at cs.unc.edu
Martin LukasiewyczGoogleVerified email at google.com
Suhaib FahmyAssociate Professor, King Abdullah University of Science and Technology (KAUST)Verified email at kaust.edu.sa
Jin Song DongProfessor of Computer Science, National University of Singapore and Griffith UniversityVerified email at nus.edu.sg
Guangdong BaiSenior Lecturer of the University of QueenslandVerified email at uq.edu.au