Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaVerified email at scs.carleton.ca
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch
Jeremy ClarkConcordia UniversityVerified email at concordia.ca
Anil SomayajiAssociate Professor, School of Computer Science, Carleton UniversityVerified email at scs.carleton.ca
Elizabeth StobertCarleton UniversityVerified email at carleton.ca
Chen ChenCarnegie Mellon UniversityVerified email at andrew.cmu.edu
Daniele Enrico AsoniETH ZürichVerified email at inf.ethz.ch
Daniel McCarneyData Security @ Square. Prev. Let's Encrypt / ISRG. Prev. Fastly.Verified email at binaryparadox.net
Gunes KayacikOktaVerified email at okta.com
Paweł SzałachowskiVerified email at google.com
Shayan EskandariConcordia UniversityVerified email at encs.concordia.ca
George DanezisUniversity College LondonVerified email at ucl.ac.uk
Heqing HuangIBM Thomas J. Watson Research CenterVerified email at us.ibm.com
Ian MolloyIBM ResearchVerified email at us.ibm.com
Sonia ChiassonProfessor, School of Computer Science, Carleton UniversityVerified email at scs.carleton.ca
Taeho LeeETH ZurichVerified email at inf.ethz.ch
William EnckProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Laurent ChuatETH ZurichVerified email at inf.ethz.ch
Carmela TroncosoEPFLVerified email at epfl.ch
David LieUniversity of TorontoVerified email at eecg.toronto.edu