Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
Pramod BhatotiaProfessor, Technical University of MunichVerified email at tum.de
Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
Christof FetzerTU DresdenVerified email at tu-dresden.de
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Ivica RimacNokia Bell LabsVerified email at nokia-bell-labs.com
Paarijaat AdityaMax Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
Le Quoc DoTU DresdenVerified email at se.inf.tu-dresden.de
Zhuhua CaiGraduate Student, Rice UniversityVerified email at rice.edu
Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Verified email at computer.org
Ennan ZhaiAlibaba GroupVerified email at alibaba-inc.com
Klaus SatzkeNokia Bell LabsVerified email at nokia-bell-labs.com
Cong TangTemi Group and Peking UniversityVerified email at infosec.pku.edu.cn
Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchVerified email at att.com
Aman ShaikhGoogleVerified email at google.com
Bryan FordEPFLVerified email at epfl.ch
David WolinskyFacebookVerified email at fb.com
Johannes GehrkeMicrosoftVerified email at microsoft.com
Feng YanUniversity of HoustonVerified email at central.uh.edu
António Damião Neves RodriguesPhD Student, University of PortoVerified email at fe.up.pt