Get my own profile
Public access
View all61 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Kari KostiainenSenior Scientist at ETH ZurichVerified email at inf.ethz.ch
Samuel MarchalAalto University / WithSecure CorporationVerified email at aalto.fi
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, ATHENE and Fraunhofer SITVerified email at sit.fraunhofer.de
Markus MiettinenSystem Security Lab, Department of Computer Science, Technical University of DarmstadtVerified email at trust.tu-darmstadt.de
Philip GinzboorgHuawei Technologies, FinlandVerified email at huawei.com
Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
Andrew PaverdMicrosoftVerified email at microsoft.com
Thomas NymanL M EricssonVerified email at ericsson.com
Mika JuutiThe Social Insurance Institution (Kela)Verified email at acm.org
Thien Duc NguyenTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Nitesh SaxenaFull Professor at the Texas A&M UniversityVerified email at tamu.edu
Hans LiljestrandUniversity of WaterlooVerified email at liljestrand.dev
Kaisa NybergAalto University School of ScienceVerified email at aalto.fi
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Sasu TarkomaProfessor of Computer Science, University of HelsinkiVerified email at helsinki.fi
Sebastian SzyllerIntel LabsVerified email at intel.com
Follow
N. Asokan
Professor of Computer Science, University of Waterloo
Verified email at uwaterloo.ca - Homepage