Get my own profile
Co-authors
Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaVerified email at scs.carleton.ca
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Jeremy ClarkConcordia UniversityVerified email at concordia.ca
Elizabeth StobertCarleton UniversityVerified email at carleton.ca
Chen ChenCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Daniel McCarneyData Security @ Square. Prev. Let's Encrypt / ISRG. Prev. Fastly.Verified email at binaryparadox.net
Daniele Enrico AsoniETH ZürichVerified email at inf.ethz.ch
Gunes KayacikAruba NetworksVerified email at hpe.com
Anil SomayajiAssociate Professor, School of Computer Science, Carleton UniversityVerified email at scs.carleton.ca
Paweł SzałachowskiGoogleVerified email at google.com
Shayan EskandariConcordia University / ConsenSys DiligenceVerified email at encs.concordia.ca
George DanezisUniversity College LondonVerified email at ucl.ac.uk
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Ian MolloyIBM ResearchVerified email at us.ibm.com
Sonia ChiassonCanada Research Chair in User-Centric Cybersecurity, Associate Professor, Carleton UniversityVerified email at scs.carleton.ca
William EnckAssociate Professor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Taeho LeeETH ZurichVerified email at inf.ethz.ch
David LieUniversity of TorontoVerified email at eecg.toronto.edu
Laurent ChuatETH ZurichVerified email at inf.ethz.ch
Carmela TroncosoEPFLVerified email at epfl.ch