Get my own profile
Public access
View all14 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Christof FetzerTU DresdenVerified email at tu-dresden.de
- Pramod BhatotiaTechnische Universität MünchenVerified email at tum.de
- Ruichuan ChenDistinguished Member of Technical Staff @ Bell LabsVerified email at ruichuan.org
- Thorsten StrufeProfessor of Privacy and Security, Karlsruhe Institute of Technology; Adjunct Professor TU DresdenVerified email at kit.edu
- Wojciech OzgaIBM Research Zurich, SwitzerlandVerified email at zurich.ibm.com
- André MartinTU DresdenVerified email at tu-dresden.de
- Pascal FelberProfessor of Computer Science, University of NeuchâtelVerified email at unine.ch
- Valerio SchiavoniProfesseur titulaire, MER, University of NeuchâtelVerified email at unine.ch
- Volker HiltNokia Bell LabsVerified email at nokia-bell-labs.com
- Rodrigo RodriguesInstituto Superior Técnico (IST - Técnico ULisboa)Verified email at campus.ul.pt
- Jatinder SinghCompliant & Accountable Systems Group, University of CambridgeVerified email at cl.cam.ac.uk
- Zhenyu WenZhejiang University of TechnologyVerified email at zjut.edu.cn
- Robert KrahnTU DresdenVerified email at tu-dresden.de
- Spyros BlanasAssistant Professor of Computer Science and Engineering, The Ohio State UniversityVerified email at osu.edu
- James Won-KI HongProfessor of Computer Science, POSTECHVerified email at postech.ac.kr
- Hector Eduardo RomanDepartment of Physics, University of Milano-BicoccaVerified email at mib.infn.it
- Myungjin LeeCisco SystemsVerified email at cisco.com
- Istemi Ekin AkkusNokia Bell LabsVerified email at mpi-sws.org
- Dimitra GiantsidiMicrosoft ResearchVerified email at microsoft.com
- Vijay NagarajanProfessor, University of UtahVerified email at cs.utah.edu