Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Petr SvendaAssociate Professor of Computer Science, Masaryk UniversityVerified email at fi.muni.cz
Chris HicksResearch Scientist, The Alan Turing InstituteVerified email at turing.ac.uk
Andrea CerulliDFINITYVerified email at dfinity.org
Dusan KlinecMasaryk University, Brno, Czech RepublicVerified email at mail.muni.cz
Dan CvrcekIndependentVerified email at cl.cam.ac.uk
Myles FoleyDoctoral Researcher, Imperial College LondonVerified email at imperial.ac.uk
Federico MaggiSenior Security EngineerVerified email at polimi.it
Yanick FratantonioSenior Research Scientist, GoogleVerified email at fratantonio.me
Christopher KruegelUniversity of California, Santa Barbara and VMware, Inc.Verified email at cs.ucsb.edu
Giovanni VignaUC Santa Barbara and VMwareVerified email at cs.ucsb.edu
Shuang HaoAssistant Professor, University of Texas at DallasVerified email at utdallas.edu
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Kate HighnamPhD Student, Imperial College LondonVerified email at imperial.ac.uk
Hayden MeltonLSEG (Deakin University, University of Auckland)Verified email at cs.auckland.ac.nz
Alexander HicksUniversity College LondonVerified email at ucl.ac.uk
Aritra DharHuawei Zurich Research CenterVerified email at huawei.com
Karl WüstMysten LabsVerified email at mystenlabs.com
Kari KostiainenSenior Scientist at ETH ZurichVerified email at inf.ethz.ch
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl