Get my own profile
Co-authors
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
- Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
- Jörg OttProfessor, Chair of Connected Mobility, Technische Universität MünchenVerified email at netlab.tkk.fi
- Kari KostiainenSenior Scientist at ETH ZurichVerified email at inf.ethz.ch
- Antti Ylä-JääskiProfessor of Telecommunications software, Aalto UniversityVerified email at aalto.fi
- seamus moloneyF-SecureVerified email at f-secure.com
- Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
- Murtuza JadliwalaUniversity of Texas at San AntonioVerified email at utsa.edu
- Igor BilogrevicStaff Research Scientist, GoogleVerified email at google.com
- Mohsin Ali KhanResearcher - Security Standardization, Ericsson ResearchVerified email at ericsson.com
- Imad AadCenter for Digital Trust (C4DT), EPFLVerified email at aad.me
- Kimmo JärvinenXiphera Ltd.Verified email at xiphera.com
- Gizem AkmanUniversity of HelsinkiVerified email at helsinki.fi
- Andrey KrendzelResearch Associate, CTTCVerified email at cttc.cat
- Ersin UzunGlobal Cybersecurity Institute, Rochester Institute of TechnologyVerified email at rit.edu
- Hamza HarkousResearch Scientist at GoogleVerified email at google.com
- Mário Jorge Costa, PhDPrincipal Engineer in Machine Learning, NokiaVerified email at nokia.com
- Xavier GelabertHuawei Technologies Sweden AB | Principal Research EngineerVerified email at ieee.org
- Lars EggertMozillaVerified email at mozilla.com