Get my own profile
Public access
View all65 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
- Kari KostiainenSenior Scientist at ETH ZurichVerified email at inf.ethz.ch
- Samuel MarchalResearch Team Leader, VTT Technical Research Centre of FinlandVerified email at vtt.fi
- Philip GinzboorgHuawei Technologies, FinlandVerified email at huawei.com
- Markus MiettinenFaculty of Computer Science and Engineering, Frankfurt University of Applied SciencesVerified email at fb2.fra-uas.de
- Michael WaidnerTU Darmstadt, ATHENE, Fraunhofer SITVerified email at tu-darmstadt.de
- Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
- Andrew PaverdMicrosoftVerified email at microsoft.com
- Thomas NymanL M EricssonVerified email at ericsson.com
- Mika JuutiThe Social Insurance Institution (Kela)Verified email at acm.org
- Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoVerified email at helsinki.fi
- Thien Duc NguyenTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
- Hans LiljestrandUniversity of WaterlooVerified email at intel.com
- Kaisa NybergAalto University School of ScienceVerified email at aalto.fi
- Nitesh SaxenaFull Professor at the Texas A&M UniversityVerified email at tamu.edu
- Sasu TarkomaProfessor of Computer Science, University of HelsinkiVerified email at helsinki.fi
- Sebastian SzyllerIntel LabsVerified email at intel.com
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Follow
N. Asokan
Professor of Computer Science, University of Waterloo
Verified email at uwaterloo.ca - Homepage