Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Istemi Ekin AkkusNokia Bell LabsEmail verificata su mpi-sws.org
- Pramod BhatotiaProfessor, TU MunichEmail verificata su tum.de
- Volker HiltNokia Bell LabsEmail verificata su nokia-bell-labs.com
- Christof FetzerTU DresdenEmail verificata su tu-dresden.de
- Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenEmail verificata su kit.edu
- Ivica RimacNokia Bell LabsEmail verificata su nokia-bell-labs.com
- Paarijaat AdityaMax Planck Institute for Software Systems (MPI-SWS)Email verificata su mpi-sws.org
- Le Quoc DoTU DresdenEmail verificata su se.inf.tu-dresden.de
- Zhuhua CaiGraduate Student, Rice UniversityEmail verificata su rice.edu
- Eng Keong LuaPhD in Computer Science (University of Cambridge, UK)Email verificata su computer.org
- Klaus SatzkeNokia Bell LabsEmail verificata su nokia-bell-labs.com
- Ennan ZhaiAlibaba GroupEmail verificata su alibaba-inc.com
- Cong TangTemi Group and Peking UniversityEmail verificata su infosec.pku.edu.cn
- Feng YanUniversity of HoustonEmail verificata su central.uh.edu
- Wei WangThe Hong Kong University of Science and TechnologyEmail verificata su cse.ust.hk
- Bryan FordEPFLEmail verificata su epfl.ch
- David WolinskyFacebookEmail verificata su fb.com
- Jia WangIEEE Fellow, Lead Inventive Scientist, AT&T Labs - ResearchEmail verificata su att.com
- Aman ShaikhGoogleEmail verificata su google.com
- Johannes GehrkeMicrosoftEmail verificata su microsoft.com