Get my own profile
Public access
View all23 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
- Gareth T. DaviesNXP SemiconductorsVerified email at nxp.com
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Christopher CarrUniversity of Exeter, UKVerified email at exeter.ac.uk
- Peter Browne RønneResearcherVerified email at nbi.dk
- S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
- Mohsen TooraniAssociate Professor, University of South-Eastern Norway (USN)Verified email at usn.no
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Katriel Cohn-GordonMetaVerified email at katriel.co.uk
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
- Rene PeraltaNISTVerified email at nist.gov
- James AspnesYale UniversityVerified email at yale.edu
- Clementine GrittiProfessor Junior, INSA LyonVerified email at insa-lyon.fr
- Håvard RaddumSimula Research LaboratoryVerified email at simula.no
- Anamaria CostacheNorwegian University of Science and TechnologyVerified email at ntnu.no