Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Edward DawsonEmeritus Professor Queensland University of TechnologyEmail verificata su qut.edu.au
- Juan GonzalezTeron LabsEmail verificata su teronlabs.com
- Douglas StebilaUniversity of WaterlooEmail verificata su uwaterloo.ca
- Audun JøsangProfessor of Information Security, University of OsloEmail verificata su mn.uio.no
- Anish MathuriaProfessor, DA-IICTEmail verificata su daiict.ac.in
- Kapali ViswanathanSiemens TechnologyEmail verificata su siemens.com
- Wageeh BolesFull Professor, Queensland University of TechnologyEmail verificata su qut.edu.au
- Hussain NyeemPhD, Queensland University of Technology, AustraliaEmail verificata su eece.mist.ac.bd
- M Choudary GorantlaFinastraEmail verificata su finastra.com
- Kenny PatersonProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
- Craig CostelloPrincipal Researcher, Microsoft Research, USAEmail verificata su microsoft.com
- Ian H. WittenProfessor of Computer Science, University of Waikato, New ZealandEmail verificata su waikato.ac.nz
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongEmail verificata su ie.cuhk.edu.hk
- Anthony J MaederEmeritus Professor, Flinders UniversityEmail verificata su flinders.edu.au
- Andrew P. BradleyWhipbird SignalsEmail verificata su ieee.org
- Jason A. DowlingCommonwealth Scientific and Industrial Research Organisation (CSIRO), AustraliaEmail verificata su csiro.au
- Cas CremersCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Irfan AhmedVirginia Commonwealth UniversityEmail verificata su vcu.edu