Get my own profile
Public access
View all22 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
- Zbigniew KotulskiWarsaw University of TechnologyVerified email at tele.pw.edu.pl
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Ivan HomoliakAssistant Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
- Laurent ChuatETH ZurichVerified email at inf.ethz.ch
- Daniël ReijsbergenSingapore University of Technology and DesignVerified email at sutd.edu.sg
- Tiffany Hyun-Jin KimCarnegie Mellon UniversityVerified email at ece.cmu.edu
- Bogdan KsiezopolskiKozminski UniversityVerified email at acm.org
- Sarad VenugopalanUniversity of BristolVerified email at bristol.ac.uk
- Zengpeng LiShandong UniversityVerified email at email.sdu.edu.cn
- Stephanos MatsumotoCarnegie Mellon University, ETH ZurichVerified email at cmu.edu
- David BarreraAssociate professor, Carleton UniversityVerified email at carleton.ca
- Chunpeng GeUniversity of Wollongong, Research FellowVerified email at uow.edu.au
- Taeho LeeETH ZurichVerified email at inf.ethz.ch
- Siwei SunChinese Academy of SciencesVerified email at ucas.ac.cn
- Bithin AlangotHuawei Munich Research CenterVerified email at huawei.com
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk