Get my own profile
Public access
View all55 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Kari KostiainenSenior Scientist at ETH ZurichVerified email at inf.ethz.ch
Philip GinzboorgHuawei Technologies and Aalto University, FinlandVerified email at huawei.com
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, Fraunhofer SITVerified email at sit.tu-darmstadt.de
Markus MiettinenPostdoctoral Researcher at Technische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
Samuel MarchalAalto University / F-Secure CorporationVerified email at aalto.fi
Andrew PaverdMicrosoft ResearchVerified email at microsoft.com
Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
Thomas NymanL M EricssonVerified email at ericsson.com
Mika JuutiThe Social Insurance Institution (Kela)Verified email at acm.org
Thien Duc NguyenTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Nitesh SaxenaFull Professor at the University of Alabama at BirminghamVerified email at uab.edu
Kaisa NybergAalto University School of ScienceVerified email at aalto.fi
Michael SteinerResearch Scientist, Intel LabsVerified email at acm.org
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Hien TruongNEC Laboratories EuropeVerified email at neclab.eu
Sasu TarkomaProfessor of Computer Science, University of HelsinkiVerified email at helsinki.fi
Victor ShoupProfessor of Computer Science, New York UniversityVerified email at cs.nyu.edu
N. Asokan
Professor of Computer Science, University of Waterloo
Verified email at uwaterloo.ca - Homepage