Get my own profile
Public access
View all28 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
S LingVerified email at ntu.edu.sg
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bing SunNational University of Defense TechnologyVerified email at kuleuven.be
Alexandre DucProfessor in information security, HEIG-VD, SwitzerlandVerified email at heig-vd.ch
Kazumaro AokiBunkyo UniversityVerified email at bunkyo.ac.jp
Mu-En Wu (吳牧恩, mnwu)臺北科技大學資訊與財金管理系Verified email at ntut.edu.tw
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
HM SunProfessor of Computer Science, National Tsing Hua UniversityVerified email at cs.nthu.edu.tw
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de