Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Willi MeierFHNWVerified email at fhnw.ch
Simon D. FischerSiemens SwitzerlandVerified email at simonfischer.ch
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Douglas WikströmKTH Royal Institute of TechnologyVerified email at kth.se
Mohammad KiaeiMicrosoftVerified email at microsoft.com
Thomas PeyrinAssociate Professor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Amir JafariAssistant Professor of Mathematics, Sharif University of TechnologyVerified email at sharif.ir
Tal MoranIDC HerzliyaVerified email at idc.ac.il
Karim BagheryPostdoc at COSIC, KU LeuvenVerified email at kuleuven.be
Behzad AbdolmalekiMax Planck Institute for Security and Privacy, GermanyVerified email at csp.mpg.de
Deian StefanUC San DiegoVerified email at eng.ucsd.edu
Tor HellesethUniversity of BergenVerified email at uib.no
Farokhlagha MoazamiShahid Beheshti UniversityVerified email at sbu.ac.ir
Mojtaba RafieeAssistant Professor of Computer Science, University of Isfahan