Get my own profile
Public access
View all33 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Zhenzhen BaoTsinghua UniversityVerified email at tsinghua.edu.cn
Ling SongJinan University, Guangzhou, ChinaVerified email at jnu.edu.cn
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
S LingVerified email at ntu.edu.sg
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesVerified email at iie.ac.cn
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Jérémy JEANANSSIVerified email at ssi.gouv.fr
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Kexin QiaoChinese Academy of SciencesVerified email at iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Vincent RijmenUniversity of Leuven (KU Leuven)Verified email at esat.kuleuven.be
Bing SunNational University of Defense TechnologyVerified email at kuleuven.be
guozhen liuShanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Eik ListChair of Media Security, Bauhaus-Universität WeimarVerified email at uni-weimar.de
Xiaoyang DongAssociate Professor, Tsinghua UniversityVerified email at tsinghua.edu.cn
Chun GuoShandong UniversityVerified email at sdu.edu.cn