Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Robert BiddleProfessor of Computer Science and Cognitive Science, Carleton UniversityVerified email at hotsoft.carleton.ca
Sonia ChiassonProfessor, School of Computer Science, Carleton UniversityVerified email at scs.carleton.ca
Alain ForgetGoogleVerified email at scs.carleton.ca
Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaVerified email at scs.carleton.ca
David BarreraAssistant professor, Carleton UniversityVerified email at carleton.ca
Jeremy ClarkConcordia UniversityVerified email at concordia.ca
Shayan EskandariConcordia UniversityVerified email at encs.concordia.ca
Heather MolyneauxNRCVerified email at nrc-cnrc.gc.ca
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Andrew PaverdMicrosoftVerified email at microsoft.com
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de
Maximilian GollaMax Planck Institute for Security and PrivacyVerified email at mpi-sp.org
Philipp MarkertPhD Student @ Ruhr University BochumVerified email at rub.de
Luka MalisaETH ZurichVerified email at inf.ethz.ch
David M. SommerSystem Security Group, ETH ZürichVerified email at inf.ethz.ch
Irina KondratovaResearch Officer, NRCVerified email at nrc.ca
Mohammad MannanAssociate Professor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca
Tina SafaieConcordia UniversityVerified email at encs.concordia.ca
Amr YoussefConcordia UniversityVerified email at ciise.concordia.ca
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch