Get my own profile
Public access
View all49 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GenkinGeorgia TechVerified email at gatech.edu
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Moritz LippVerified email at mlq.me
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Gernot HeiserProfessor of Computer Science, University of New South WalesVerified email at unsw.edu.au
Qian GeGoogleVerified email at google.com
Jann HornGoogle Project ZeroVerified email at google.com
Marina MinkinUniversity of MichiganVerified email at umich.edu
Katrina FalknerProfessor, School of Computer Science, University of AdelaideVerified email at adelaide.edu.au
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Raoul StrackxFortanixVerified email at fortanix.com
Fangfei LiuIntel CorporationVerified email at intel.com
Baris KasikciUniversity of WashingtonVerified email at cs.washington.edu
Daniel MoghimiGoogleVerified email at google.com
Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu
Andrew KwongUNC Chapel HillVerified email at cs.unc.edu
Yossi OrenAssociate Professor at Ben-Gurion UniversityVerified email at bgu.ac.il
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu