Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Carl A. GunterGeorge and Ann Fisher Distinguished Professor, University of Illinois at Urbana-ChampaignVerified email at illinois.edu
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch
Haixu TangProfessor, Indiana UniversityVerified email at indiana.edu
Reza ShokriAssistant Professor, National University of SingaporeVerified email at comp.nus.edu.sg
Thomas RistenpartAssociate Professor of Computer Science, Cornell TechVerified email at cornell.edu
Paul GrubbsNYU, Cornell Tech, University of MichiganVerified email at umich.edu
Xiaorui PanIndiana UniversityVerified email at indiana.edu
XiaoFeng WangJames H. Rudy Professor of Computer Science, Indiana University at BloomingtonVerified email at indiana.edu
Yunhui LongUniversity of Illinois at Urbana-ChampaignVerified email at illinois.edu
Ersin UzunPalo Alto Research Center (PARC)Verified email at parc.com
Shantanu RaneResearch Area Manager, Cyber-Physical Systems Security, Xerox PARC.Verified email at parc.com
Diyue Buph.D. student, Indiana UniversityVerified email at indiana.edu
Kai ChenInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Yinqian ZhangSouthern University of Science and TechnologyVerified email at acm.org
Guoxing ChenAssistant Professor of Computer Science & Engineering Department, Shanghai Jiao Tong UniversityVerified email at cs.sjtu.edu.cn
Wenhao WangInstitute of Information Engineering, Indiana UniversityVerified email at iie.ac.cn
Kévin HugueninProfessor, Université de Lausanne (UNIL)Verified email at unil.ch
Kevin SekniqiPhD Computer Science, Cornell UniversityVerified email at sekniqi.com
David CashUniversity of ChicagoVerified email at cs.uchicago.edu
Julien FreudigerAppleVerified email at frdgr.ch
Vincent Bindschaedler
Assistant Professor at the University of Florida
Verified email at cise.ufl.edu - Homepage