Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Robert BiddleProfessor of Computer Science and Cognitive Science, Carleton UniversityVerified email at hotsoft.carleton.ca
- Sonia ChiassonProfessor, School of Computer Science, Carleton UniversityVerified email at scs.carleton.ca
- Alain ForgetGoogleVerified email at scs.carleton.ca
- Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaVerified email at scs.carleton.ca
- David BarreraAssociate professor, Carleton UniversityVerified email at carleton.ca
- Jeremy ClarkConcordia UniversityVerified email at concordia.ca
- Shayan EskandariConcordia UniversityVerified email at encs.concordia.ca
- Heather MolyneauxNRCVerified email at nrc-cnrc.gc.ca
- Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
- Maximilian GollaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Philipp MarkertFormer researcher @ Ruhr University BochumVerified email at rub.de
- Aniqa AlamCarleton UniversityVerified email at carleton.ca
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Andrew PaverdMicrosoftVerified email at microsoft.com
- Luka MalisaETH ZurichVerified email at inf.ethz.ch
- David M. SommerSystem Security Group, ETH ZürichVerified email at inf.ethz.ch
- Irina KondratovaResearch Officer, NRCVerified email at nrc.ca
- Lin KyiPhD Student, Max Planck Institute for Security and PrivacyVerified email at mpi-sp.org
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca
- Tina SafaieConcordia UniversityVerified email at encs.concordia.ca