Get my own profile
Public access
View all12 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Christof FetzerTU DresdenVerified email at tu-dresden.de
Pramod BhatotiaProfessor, TU MunichVerified email at tum.de
Ruichuan ChenDistinguished Member of Technical Staff @ Bell LabsVerified email at ruichuan.org
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Wojciech OzgaIBM Research Zurich, SwitzerlandVerified email at zurich.ibm.com
André MartinTU DresdenVerified email at tu-dresden.de
Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
Pascal FelberProfessor of Computer Science, University of NeuchâtelVerified email at unine.ch
Valerio SchiavoniMaître-Assistant, University of NeuchâtelVerified email at unine.ch
Zhenyu WenZhejiang University of TechnologyVerified email at zjut.edu.cn
Jatinder SinghCompliant & Accountable Systems Group, University of CambridgeVerified email at cl.cam.ac.uk
James Won-KI HongProfessor of Computer Science, POSTECHVerified email at postech.ac.kr
Hector Eduardo RomanDepartment of Physics, University of Milano-BicoccaVerified email at mib.infn.it
Myungjin LeeCisco SystemsVerified email at cisco.com
Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
Spyros BlanasAssistant Professor of Computer Science and Engineering, The Ohio State UniversityVerified email at osu.edu
Rafael PiresEPFLVerified email at epfl.ch
Sébastien VaucherUniversité de NeuchâtelVerified email at unine.ch
Zahra TarkhaniMicrosoftVerified email at cl.cam.ac.uk
Dimitra GiantsidiThe University of EdinburghVerified email at sms.ed.ac.uk