Get my own profile
Public access
View all14 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Christof FetzerTU DresdenVerified email at tu-dresden.de
Pramod BhatotiaTechnische Universität MünchenVerified email at tum.de
Ruichuan ChenDistinguished Member of Technical Staff @ Bell LabsVerified email at ruichuan.org
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Wojciech OzgaIBM Research Zurich, SwitzerlandVerified email at zurich.ibm.com
André MartinTU DresdenVerified email at tu-dresden.de
Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
Pascal FelberProfessor of Computer Science, University of NeuchâtelVerified email at unine.ch
Valerio SchiavoniMER, University of NeuchâtelVerified email at unine.ch
Jatinder SinghCompliant & Accountable Systems Group, University of CambridgeVerified email at cl.cam.ac.uk
Zhenyu WenZhejiang University of TechnologyVerified email at zjut.edu.cn
Spyros BlanasAssistant Professor of Computer Science and Engineering, The Ohio State UniversityVerified email at osu.edu
James Won-KI HongProfessor of Computer Science, POSTECHVerified email at postech.ac.kr
Hector Eduardo RomanDepartment of Physics, University of Milano-BicoccaVerified email at mib.infn.it
Robert KrahnTU DresdenVerified email at tu-dresden.de
Myungjin LeeCisco SystemsVerified email at cisco.com
Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
Dimitra GiantsidiThe University of EdinburghVerified email at sms.ed.ac.uk
Vijay NagarajanProfessor, University of UtahVerified email at cs.utah.edu
Vasilis GavrielatosSenior Researcher, Huawei Research UKVerified email at huawei.com