Get my own profile
Public access
View all46 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Nigel SmartKU LeuvenVerified email at kuleuven.be
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Jan CamenischDFINITYVerified email at dfinity.org
Zhaohui ChengLecturer of Computer Science, Middlesex UniversityVerified email at olymtech.net
Changyu DongNewcastle UniversityVerified email at newcastle.ac.uk
Helen TreharneProfessor, Department of Computer Science, University of SurreyVerified email at surrey.ac.uk
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Christian WachsmannIntel Germany GmbH & Co. KGVerified email at intel.com
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Hoon Wei LimSingtelVerified email at singtel.com
Michael ClarksonLecturer in Computer Science, Cornell UniversityVerified email at cornell.edu
Gurchetan GrewalSecurity Architect at Jaguar Land RoverVerified email at jaguarlandrover.com