Get my own profile
Public access
View all27 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Giulio MalavoltaBocconi UniversityVerified email at unibocconi.it
Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Christoph EggerIRIF, Université Paris CitéVerified email at irif.fr
Hoover H. F. YinThe Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Tim RuffingVerified email at real-or-random.org
Hong-Sheng ZhouVirginia Commonwealth UniversityVerified email at vcu.edu
Kai-Min ChungInstitute of Information Science, Academia SinicaVerified email at iis.sinica.edu.tw
Yu-Chi ChenDepartment of Computer Science and Information Engineering, National Taipei University of TechnologyVerified email at ntut.edu.tw
Wei-Kai LinUniversity of VirginiaVerified email at virginia.edu
Kam-Fung (Henry) CheungUniversity of New South WalesVerified email at unsw.edu.au
Nico DöttlingFaculty at the Helmholtz Center for Information Security (CISPA)Verified email at cispa.de
Ka Hei NgDepartment of Physics and Institute of Theoretical Physics, The Chinese University of Hong KongVerified email at link.cuhk.edu.hk
Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity Center, Key Researcher SBA ResearchVerified email at tuwien.ac.at
Anthony Man-Cho SoDepartment of Systems Engineering and Engineering Management, The Chinese University of Hong KongVerified email at se.cuhk.edu.hk
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Xavier BultelINSA Centre-Val de LoireVerified email at insa-cvl.fr
Yuval IshaiTechnionVerified email at cs.technion.ac.il
Markus ZoppeltVerified email at zoppelt.net
Victor Isaac KolobovTechnionVerified email at campus.technion.ac.il