Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
Pramod BhatotiaProfessor, TU MunichVerified email at tum.de
Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
Christof FetzerTU DresdenVerified email at tu-dresden.de
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Ivica RimacNokia Bell LabsVerified email at nokia-bell-labs.com
Paarijaat AdityaMax Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
Le Quoc DoTU DresdenVerified email at se.inf.tu-dresden.de
Zhuhua CaiGraduate Student, Rice UniversityVerified email at rice.edu
Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Verified email at computer.org
Klaus SatzkeNokia Bell LabsVerified email at nokia-bell-labs.com
Ennan ZhaiAlibaba GroupVerified email at alibaba-inc.com
Cong TangTemi Group and Peking UniversityVerified email at infosec.pku.edu.cn
Feng YanUniversity of HoustonVerified email at central.uh.edu
Bryan FordEPFLVerified email at epfl.ch
David WolinskyFacebookVerified email at fb.com
Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchVerified email at att.com
Aman ShaikhGoogleVerified email at google.com
Johannes GehrkeMicrosoftVerified email at microsoft.com
Minchen YuThe Chinese University of Hong Kong, ShenzhenVerified email at cuhk.edu.cn