Get my own profile
Public access
View all11 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Bernhard JungkAlbstadt-Sigmaringen UniversityVerified email at hs-albsig.de
Annelie HeuserCNRS researcherVerified email at irisa.fr
Michael ZohnerHochschule FuldaVerified email at informatik.hs-fulda.de
Abdulhadi ShoufanKhalifa UniversityVerified email at ku.ac.ae
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Victor LomnéNinjaLabVerified email at ninjalab.io
Laurent SauvageInstitut Mines-TélécomVerified email at telecom-paris.fr
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Dr. Sunil Dath Kumar MalipatlollaCyber Security ManagerVerified email at arriver.com
Vincent John Mooney IIIAssociate Professor of Electrical and Computer Engineering, Georgia TechVerified email at ece.gatech.edu
Gavin Xiaoxu YaoCity University of Hong KongVerified email at my.cityu.edu.hk
Ray C.C. CheungAssociate Provost (Digital Learning), Professor of Computer Engineering, City University of HongVerified email at cityu.edu.hk
Phuong Ha NguyeneBayVerified email at ebay.com