Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Anwar HithnawiETH ZürichVerified email at inf.ethz.ch
Simon DuquennoyRISE SICSVerified email at ri.se
Lukas BurkhalterETH ZürichVerified email at inf.ethz.ch
René HummenRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Shahid RazaDirector of Cybersecurity Unit @ RISE Sweden (formerly SICS) | Associate Professor, UppsalaVerified email at ri.se
Thiemo VoigtUppsala University and RISE Computer Science (formerly SICS)Verified email at it.uu.se
Klaus WehrleProfessor at RWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Wen Huunsw, csiro, nictaVerified email at unsw.edu.au
Kasun HewageUppsala UniversityVerified email at it.uu.se
Sylvia RatnasamyProfessor of Computer Science, UC BerkeleyVerified email at berkeley.edu
Alexander ViandApplied Cryptography Group, ETH ZürichVerified email at inf.ethz.ch
Martin HenzeRWTH Aachen University and Fraunhofer FKIEVerified email at cs.rwth-aachen.de
Jens HillerRWTH Aachen UniversityVerified email at comsys.rwth-aachen.de
Hanno WirtzRWTH Aachen UniversityVerified email at cs.rwth-aachen.de
Jan Henrik Ziegeldorfaedifion GmbH, formerly RWTH AachenVerified email at comsys.rwth-aachen.de
James GrossKTH Royal Institute of Technology, StockholmVerified email at ee.kth.se
Prof. Sanjay JhaProfessor, School of Computer Science and Engineering, University of New South WalesVerified email at cse.unsw.edu.au
Jun Young KimThe University of New South Wales, Data61 CSIRO, AustraliaVerified email at unsw.edu.au
Johannes GilgerRWTH Aachen UniversityVerified email at itsec.rwth-aachen.de
Vaibhav KulkarniData Engineering Lead @ DebiopharmVerified email at debiopharm.com