Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ernst BiersackVerified email at eurecom.fr
Matteo VarvelloResearcher at Bell LabsVerified email at nokia.com
Martin FlackAkamai Technologies, Inc.Verified email at akamai.com
Utkarsh GoelAkamaiVerified email at akamai.com
Taoufik EN-NAJJARYOrange LabsVerified email at orange.com
Zhi-Li ZhangDistinguished McKnight University Professor and Qwest Chair ProfessorVerified email at cs.umn.edu
Mike WittieMontana State UniversityVerified email at montana.edu
Yang GuoNISTVerified email at nist.gov
Vijay Kumar AdhikariUniversity of MinnesotaVerified email at cs.umn.edu
Ivica RimacNokia Bell LabsVerified email at nokia-bell-labs.com
Damiano CarraUniversity of Verona, Verona, (Italy)Verified email at univr.it
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Yanhua LiAssociate Professor at Worcester Polytechnic InstituteVerified email at wpi.edu
Jie BaoJDTVerified email at jd.com
Keith RossProfessor of Computer Science, NYU Abu DhabiVerified email at nyu.edu
Prithula DhungelVerified email at akamai.com
Vijay K. GurbaniIllinois Institute of Technology / Vail SystemsVerified email at iit.edu
Xiaojun HeiSchool of Electronic Information and Communications, Huazhong University of Science and TechnologyVerified email at hust.edu.cn
Wolfgang EffelsbergProfessor of Computer Science, University of MannheimVerified email at informatik.uni-mannheim.de
Torsten BraunProfessor of Computer ScienceVerified email at unibe.ch