Get my own profile
Public access
View all22 articles
0 articles
available
not available
Based on funding mandates
Co-authors
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.deBoris KöpfAzure Research, MicrosoftVerified email at microsoft.com
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Gene Tsudik (it/it/its)Peter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Lukas WutschitzMicrosoftVerified email at microsoft.comIan BrownResearch ICT AfricaVerified email at researchictafrica.net
Shruti TopleAzure Research, MicrosoftVerified email at microsoft.com
Thomas NymanL M EricssonVerified email at ericsson.com
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Giovanni CherubinMicrosoftVerified email at microsoft.com
Victor RuehleMicrosoftVerified email at microsoft.com
Arseny KurnikovPhD student, Aalto UniversityVerified email at aalto.fi
Yoshimichi NakatsukaUniversity of California, IrvineVerified email at uci.eduJan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
Shaza ZeitouniPostdoctoral Researcher, Technical University DarmstadtVerified email at tu-darmstadt.deErcan OzturkUniversity of California, IrvineVerified email at uci.edu
Fritz AlderNVIDIAVerified email at nvidia.com