Get my own profile
Co-authors
Thomas PeyrinAssociate Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Ling SongNanyang Technological University, Singapore; Institute of Information Engineering, Chinese AcademyVerified email at ntu.edu.sg
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Christian RechbergerAssociate Professor, DTUVerified email at groestl.info
Kazumaro AokiNTTVerified email at lab.ntt.co.jp
Vincent RijmenUniversity of LeuvenVerified email at esat.kuleuven.be
Bing SunNational University of Defense TechnologyVerified email at kuleuven.be
Josef PieprzykCSIRO Data61Verified email at csiro.au
Mu-En Wu (吳牧恩, mnwu)臺北科技大學資訊與財金管理系Verified email at ntut.edu.tw
HM SunProfessor of Computer Science, National Tsing Hua UniversityVerified email at cs.nthu.edu.tw
Ron SteinfeldSenior Lecturer, Monash UniversityVerified email at monash.edu
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Willi MeierFHNWVerified email at fhnw.ch
Hongjun WuNanyang Technological UniversityVerified email at ntu.edu.sg
Jian Guo
Verified email at ntu.edu.sg - Homepage