Get my own profile
Public access
View all59 articles
19 articles
available
not available
Based on funding mandates
Co-authors
- Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- Nigel SmartKU LeuvenVerified email at kuleuven.be
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
- Jan CamenischDFINITYVerified email at dfinity.org
- Zhaohui ChengLecturer of Computer Science, Middlesex UniversityVerified email at olymtech.net
- Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
- Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
- Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
- Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
- Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Christian WachsmannIntel CorporationVerified email at intel.com
- Daniel PageComputer Science, University of BristolVerified email at cs.bris.ac.uk
- Hoon Wei LimSingtelVerified email at singtel.com