Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martín OchoaZurich University of Applied SciencesVerified email at zhaw.ch
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Ivan HomoliakResearch Scientist, Brno University of TechnologyVerified email at fit.vutbr.cz
Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
Juan David Guarnizo HernandezPostDoc at ETHZVerified email at inf.ethz.ch
Daniele AntonioliEURECOMVerified email at eurecom.fr
David K Y YauSingapore University of Technology and DesignVerified email at sutd.edu.sg
Alvaro A. CardenasAssociate Professor of Computer Science and Engineering. University of California, Santa CruzVerified email at ucsc.edu
Zhongyuan HauPhD Student, Imperial College LondonVerified email at imperial.ac.uk
Sandra Julieta RuedaUniversidad de Los Andes, ColombiaVerified email at uniandes.edu.co
Soumik MondalAgency for Science, Technology and Research (A*STAR)Verified email at i2r.a-star.edu.sg
Follow
John H. Castellanos
PostDoc, CISPA Helmholtz Center for Information Security
Verified email at cispa.de