Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Edward DawsonEmeritus Professor Queensland University of TechnologyVerified email at qut.edu.au
Juan GonzalezTeron LabsVerified email at teronlabs.com
Douglas StebilaUniversity of WaterlooVerified email at uwaterloo.ca
Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
Kapali ViswanathanSiemens TechnologyVerified email at siemens.com
Wageeh BolesFull Professor, Queensland University of TechnologyVerified email at qut.edu.au
Hussain NyeemPhD, Queensland University of Technology, AustraliaVerified email at eece.mist.ac.bd
M Choudary GorantlaFinastraVerified email at finastra.com
Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Craig CostelloPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Ian H. WittenProfessor of Computer Science, University of Waikato, New ZealandVerified email at waikato.ac.nz
Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
Anthony J MaederEmeritus Professor, Flinders UniversityVerified email at flinders.edu.au
Andrew P. BradleyWhipbird SignalsVerified email at ieee.org
Jason A. DowlingCommonwealth Scientific and Industrial Research Organisation (CSIRO), AustraliaVerified email at csiro.au
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Irfan AhmedVirginia Commonwealth UniversityVerified email at vcu.edu