Get my own profile
Public access
View all28 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Zygmunt J. HaasCornell UniversityVerified email at ee.cornell.edu
Mohammad KhodaeiScaniaVerified email at scania.com
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Stylianos GisdakisKunglika Tekniska HögskolanVerified email at kth.se
Hongyu JinKTH Royal Institute of TechnologyVerified email at kth.se
Levente ButtyanProfessor, Budapest University of Technology and EconomicsVerified email at crysys.hu
Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
antonio kungTrialogVerified email at trialog.com
Kewei ZhangPhD Student, KTH Royal Institute of TechnologyVerified email at kth.se
Reza ShokriNational University of Singapore; MicrosoftVerified email at comp.nus.edu.sg
Imad AadCenter for Digital Trust (C4DT), EPFLVerified email at aad.me
Marco SpangheroKTH Royal Institute of TechnologyVerified email at kth.se
Antonio LioyFull Professor of Computer Engineering, Politecnico di TorinoVerified email at polito.it
Jean-Yves Le BoudecHonorary professor of communication systems, EPFLVerified email at epfl.ch
Aleksandar JovanovicPhDVerified email at alumni.epfl.ch
George TheodorakopoulosCardiff UniversityVerified email at cardiff.ac.uk
Zhendong MaPlusVerified email at plus.ai
Mikael SkoglundKTH Royal Institute of TechnologyVerified email at kth.se
Karl AbererProfessor of Computer and Communication Sciences, EPFLVerified email at epfl.ch