Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Bryan FordEPFLVerified email at epfl.ch
- Lefteris Kokoris KogiasMystenLabsVerified email at mystenlabs.com
- Nicolas GaillyPhD, EPFLVerified email at epfl.ch
- Ewa SytaTrinity CollegeVerified email at trincoll.edu
- Ismail KhoffiSecurity-/Privacy Engineer, EPFL - I&C - DEDISVerified email at epfl.ch
- Samuel NevesUniversity of CoimbraVerified email at dei.uc.pt
- Ilia PolianUniversity of StuttgartVerified email at polian.de
- Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
- Martin KreuzerUniversity of PassauVerified email at uni-passau.de
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Michael FischerProfessor of Computer Science, Yale UniversityVerified email at yale.edu
- David WolinskyFacebookVerified email at fb.com
- Atul LuykxGoogleVerified email at google.com
- Sandra SibyNew York University Abu DhabiVerified email at nyu.edu
- Raghavan KumarIntel LabsVerified email at intel.com
- Justin CapposProfessor of Computer Science and Engineering, NYUVerified email at nyu.edu
- Kirill NikitinColumbia University & New York Genome CenterVerified email at columbia.edu
- Aaron Zaunerlambda: resilient.systemsVerified email at azet.org
- Juraj SomorovskyPaderborn UniversityVerified email at upb.de
- Robert GrangerReader (Associate Professor), Department of Computer Science, University of SurreyVerified email at surrey.ac.uk