Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
Pramod BhatotiaProfessor, TU MunichVerified email at tum.de
Christof FetzerTU DresdenVerified email at tu-dresden.de
Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
Ivica RimacNokia Bell LabsVerified email at nokia-bell-labs.com
Paarijaat AdityaMax Planck Institute for Software Systems (MPI-SWS)Verified email at mpi-sws.org
Le Quoc DoTU DresdenVerified email at se.inf.tu-dresden.de
Zhuhua CaiGraduate Student, Rice UniversityVerified email at rice.edu
Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Verified email at computer.org
Ennan ZhaiAlibaba GroupVerified email at alibaba-inc.com
Klaus SatzkeNokia Bell LabsVerified email at nokia-bell-labs.com
Cong TangTemi Group and Peking UniversityVerified email at infosec.pku.edu.cn
Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchVerified email at att.com
Aman ShaikhGoogleVerified email at google.com
Bryan FordEPFLVerified email at epfl.ch
David WolinskyFacebookVerified email at fb.com
Johannes GehrkeMicrosoftVerified email at microsoft.com
Wei WangThe Hong Kong University of Science and TechnologyVerified email at cse.ust.hk
António Damião Neves RodriguesPhD Student, University of PortoVerified email at fe.up.pt