Get my own profile
Public access
View all34 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
- Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
- Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
- Axel Y. PoschmannVP of ProductVerified email at pqshield.com
- S LingNanyang Technological UniversityVerified email at ntu.edu.sg
- Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
- Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Jérémy JEANANSSIVerified email at ssi.gouv.fr
- Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
- Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
- Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
- Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
- Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
- Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
- Xiaoyang DongAssociate Professor, Tsinghua UniversityVerified email at tsinghua.edu.cn
- Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
- Bing SunNational University of Defense TechnologyVerified email at kuleuven.be
- Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
- guozhen liuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
- Chun GuoShandong UniversityVerified email at sdu.edu.cn