Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Thomas EisenbarthUniversity of LübeckVerified email at uni-luebeck.de
Moritz LippVerified email at mlq.me
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Yuval YaromRuhr University BochumVerified email at rub.de
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Nadia HeningerUniversity of California San DiegoVerified email at cs.ucsd.edu
Berk GulmezogluIowa State UniversityVerified email at iastate.edu
Deian StefanUC San DiegoVerified email at eng.ucsd.edu
Dean TullsenProfessor of Computer Science and Engineering, UC San DiegoVerified email at eng.ucsd.edu
Claudio CanellaAmazon Web ServicesVerified email at amazon.com
Saad IslamWorcester Polytechnic InstituteVerified email at wpi.edu
Craig DisselkoenUC San DiegoVerified email at cs.ucsd.edu
Anjo Vahldiek-OberwagnerResearch Scientist, Intel LabsVerified email at intel.com
Ravi SahitaRivos inc.Verified email at rivosinc.com
Gabrielle De MicheliUniversity of California, San DiegoVerified email at eng.ucsd.edu
Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Gilles BartheMPI-SP and IMDEA Software InstituteVerified email at mpi-sp.org