Get my own profile
Public access
View all24 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Zygmunt J. HaasCornell UniversityVerified email at ee.cornell.edu
Mohammad KhodaeiScaniaVerified email at scania.com
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Stylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
Hongyu JinKTHVerified email at kth.se
Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
antonio kungTrialogVerified email at trialog.com
Reza ShokriNational University of Singapore; MicrosoftVerified email at comp.nus.edu.sg
Kewei ZhangPhD Student, KTH Royal Institute of TechnologyVerified email at kth.se
Imad AadCenter for Digital Trust (C4DT), EPFLVerified email at aad.me
Antonio LioyFull Professor of Computer Engineering, Politecnico di TorinoVerified email at polito.it
Jean-Yves Le BoudecHonorary professor of communication systems, EPFLVerified email at epfl.ch
Aleksandar JovanovicPhDVerified email at alumni.epfl.ch
George TheodorakopoulosCardiff UniversityVerified email at cardiff.ac.uk
Marco SpangheroKTH Royal Institute of TechnologyVerified email at kth.se
Zhendong MaPlusVerified email at plus.ai
Matthias GrossglauserEPFLVerified email at epfl.ch
Karl AbererProfessor of Computer and Communication Sciences, EPFLVerified email at epfl.ch