Get my own profile
Public access
View all45 articles
1 article
available
not available
Based on funding mandates
Co-authors
Daniel GenkinGeorgia TechVerified email at gatech.edu
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Moritz LippVerified email at mlq.me
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Gernot HeiserProfessor of Computer Science, UNSW SydneyVerified email at unsw.edu.au
Qian GeGoogleVerified email at google.com
Jann HornGoogle Project ZeroVerified email at google.com
Marina MinkinUniversity of MichiganVerified email at umich.edu
Katrina FalknerProfessor, School of Computer Science, University of AdelaideVerified email at adelaide.edu.au
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Raoul StrackxFortanixVerified email at fortanix.com
Fangfei LiuIntel CorporationVerified email at intel.com
Daniel MoghimiGoogleVerified email at google.com
Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceVerified email at princeton.edu
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
Ofir WeisseUniversity of MichiganVerified email at umich.edu
Baris KasikciUniversity of MichiganVerified email at umich.edu
Mark SilbersteinAssociate Professor, Technion, IsraelVerified email at ee.technion.ac.il