Get my own profile
Public access
View all27 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
- Zygmunt J. HaasCornell UniversityVerified email at ee.cornell.edu
- Mohammad KhodaeiScaniaVerified email at scania.com
- Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
- Stylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
- Hongyu JinKTH Royal Institute of TechnologyVerified email at kth.se
- Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
- Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
- antonio kungTrialogVerified email at trialog.com
- Reza ShokriNational University of Singapore; MicrosoftVerified email at comp.nus.edu.sg
- Kewei ZhangPhD Student, KTH Royal Institute of TechnologyVerified email at kth.se
- Imad AadCenter for Digital Trust (C4DT), EPFLVerified email at aad.me
- Antonio LioyFull Professor of Computer Engineering, Politecnico di TorinoVerified email at polito.it
- Jean-Yves Le BoudecHonorary professor of communication systems, EPFLVerified email at epfl.ch
- Marco SpangheroKTH Royal Institute of TechnologyVerified email at kth.se
- Aleksandar JovanovicPhDVerified email at alumni.epfl.ch
- George TheodorakopoulosCardiff UniversityVerified email at cardiff.ac.uk
- Zhendong MaPlusVerified email at plus.ai
- Matthias GrossglauserEPFLVerified email at epfl.ch
- Mikael SkoglundKTH Royal Institute of TechnologyVerified email at kth.se