Get my own profile
Public access
View all39 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Daniel GenkinGeorgia TechVerified email at gatech.edu
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Moritz LippGraz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Gernot HeiserProfessor of Computer Science, UNSW SydneyVerified email at unsw.edu.au
Qian GeGoogleVerified email at google.com
Katrina FalknerProfessor, School of Computer Science, University of AdelaideVerified email at adelaide.edu.au
Marina MinkinUniversity of MichiganVerified email at umich.edu
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Fangfei LiuIntel CorporationVerified email at intel.com
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu
Raoul StrackxFortanixVerified email at fortanix.com
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
Ofir WeisseUniversity of MichiganVerified email at umich.edu
Baris KasikciUniversity of MichiganVerified email at umich.edu
Mark SilbersteinAssociate Professor, Technion, IsraelVerified email at ee.technion.ac.il
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu