Get my own profile
Public access
View all16 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Giulio MalavoltaMax Planck Institute for Security and PrivacyVerified email at csp.mpg.de
Christoph EggerFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at cs.fau.de
Hong-Sheng ZhouVirginia Commonwealth UniversityVerified email at vcu.edu
Kai-Min ChungInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Yu-Chi ChenDepartment of Computer Science and Engineering, Yuan Ze UniversityVerified email at saturn.yzu.edu.tw
Wei-Kai LinNortheastern UniversityVerified email at cs.cornell.edu
Hoover H. F. YinInstitute of Network Coding, The Chinese University of Hong KongVerified email at inc.cuhk.edu.hk
Tim RuffingVerified email at timruffing.de
Ka Hei NgDepartment of Physics, The Chinese University of Hong KongVerified email at link.cuhk.edu.hk
Matteo MaffeiFull Professor at TU WienVerified email at tuwien.ac.at
Anthony Man-Cho SoDepartment of Systems Engineering and Engineering Management, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
Kam-Fung (Henry) CheungResearch Associate, Information Systems and Technology Management, University of New South WalesVerified email at unsw.edu.au
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
xavier bultelLIMOS, Université Clermont AuvergneVerified email at irisa.fr
Markus ZoppeltVerified email at zoppelt.net
Victor Isaac KolobovTechnionVerified email at campus.technion.ac.il