Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Thomas PeyrinAssociate Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
S LingVerified email at ntu.edu.sg
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Zhenzhen BaoNanyang Technological UniversityVerified email at ntu.edu.sg
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bing SunNational University of Defense TechnologyVerified email at kuleuven.be
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Josef PieprzykCSIRO Data61Verified email at csiro.au
Mu-En Wu (吳牧恩, mnwu)臺北科技大學資訊與財金管理系Verified email at ntut.edu.tw
HM SunProfessor of Computer Science, National Tsing Hua UniversityVerified email at cs.nthu.edu.tw