Get my own profile
Public access
View all22 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Zbigniew KotulskiWarsaw University of TechnologyVerified email at tele.pw.edu.pl
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Ivan HomoliakAssociate Professor, Brno University of TechnologyVerified email at fit.vutbr.cz
Laurent ChuatETH ZurichVerified email at inf.ethz.ch
Daniël ReijsbergenSingapore University of Technology and DesignVerified email at sutd.edu.sg
Tiffany Hyun-Jin KimCarnegie Mellon UniversityVerified email at ece.cmu.edu
Bogdan KsiezopolskiKozminski UniversityVerified email at acm.org
Sarad VenugopalanUniversity of BristolVerified email at bristol.ac.uk
Zengpeng LiShandong UniversityVerified email at email.sdu.edu.cn
Stephanos MatsumotoCarnegie Mellon University, ETH ZurichVerified email at cmu.edu
David BarreraAssociate professor, Carleton UniversityVerified email at carleton.ca
Chunpeng GeUniversity of Wollongong, Research FellowVerified email at uow.edu.au
Taeho LeeETH ZurichVerified email at inf.ethz.ch
Siwei SunChinese Academy of SciencesVerified email at ucas.ac.cn
Bithin AlangotHuawei Munich Research CenterVerified email at huawei.com
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk