Get my own profile
Public access
View all59 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Daniel GenkinGeorgia TechVerified email at gatech.edu
- Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Moritz LippVerified email at mlq.me
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Gernot HeiserProfessor of Computer Science, University of New South WalesVerified email at unsw.edu.au
- Qian GeGoogleVerified email at google.com
- Jann HornGoogle Project ZeroVerified email at google.com
- Marina MinkinUniversity of MichiganVerified email at umich.edu
- Katrina FalknerProfessor, School of Computer Science, University of AdelaideVerified email at adelaide.edu.au
- Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Raoul StrackxFortanixVerified email at fortanix.com
- Baris KasikciUniversity of WashingtonVerified email at cs.washington.edu
- Chitchanok ChuengsatiansupThe University of KlagenfurtVerified email at aau.at
- Fangfei LiuIntel CorporationVerified email at intel.com
- Daniel MoghimiSenior Research Scientist, GoogleVerified email at google.com
- Andrew KwongUNC Chapel HillVerified email at cs.unc.edu
- Sioli O'ConnellThe University of AdelaideVerified email at adelaide.edu.au
- Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu