Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Harshad SathayeETH ZurichVerified email at inf.ethz.ch
Domien SchepersNortheastern UniversityVerified email at northeastern.edu
Ramya Jayaram MastiAmpere ComputingVerified email at amperecomputing.com
Guevara NoubirProfessor of Computer Science, Northeastern UniversityVerified email at ccs.neu.edu
Mathy VanhoefDistriNet, KU LeuvenVerified email at kuleuven.be
Pau ClosasAssociate Professor of ECE, Northeastern UniversityVerified email at northeastern.edu
Boris DanevDoctor in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Mridula SinghCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Narmeen ShafqatNortheastern UniversityVerified email at northeastern.edu
Evangelos BitsikasDoctoral Researcher, Northeastern UniversityVerified email at northeastern.edu
Vincent LendersCyber-Defence Campus, armasuisseVerified email at lenders.ch
Lothar ThieleProfessor of Computer Engineering, ETH ZurichVerified email at ethz.ch
Devendra RaiSwiss Federal Institute, ZurichVerified email at tik.ee.ethz.ch
Patrick LeuETH ZurichVerified email at inf.ethz.ch
Christina PöpperNew York University Abu DhabiVerified email at nyu.edu
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Dinesh BharadiaAssociate Professor of ECE at UCSDVerified email at ucsd.edu
Luka MalisaETH ZurichVerified email at inf.ethz.ch