Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaVerified email at scs.carleton.ca
Ashraf MatrawyProfessor, Carleton UniversityVerified email at carleton.ca
Tao WanDistinguished Technologist at CableLabs & Adjunct Professor at Carleton UniversityVerified email at cablelabs.com
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Hala AssalAssistant Professor, Carleton UniversityVerified email at sce.carleton.ca
Laurent ChuatETH ZurichVerified email at inf.ethz.ch
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Christoph SprengerSenior researcher at ETH ZurichVerified email at inf.ethz.ch
Enis UlqinakuChainSecurity, SwitzerlandVerified email at inf.ethz.ch
Sonia ChiassonProfessor, School of Computer Science, Carleton UniversityVerified email at scs.carleton.ca
David BarreraAssistant professor, Carleton UniversityVerified email at carleton.ca
Patrick LeuETH ZurichVerified email at inf.ethz.ch
Mridula SinghCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Furkan AlacaAssistant Professor at Queen's University School of ComputingVerified email at queensu.ca
Ali Sadeghi JahromiPh.D. candidate, Carleton University, CanadaVerified email at cmail.carleton.ca
Ossama IsmailFounding dean, Regional Informatics Center - RCD,ICPC- ACPC- Arab Academy for Science and TechnologyVerified email at aast.edu
Tamara BondarCarleton UniversityVerified email at cmail.carleton.ca
William FindlayCarleton UniversityVerified email at cmail.carleton.ca