Get my own profile
Public access
View all48 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Nigel SmartKU LeuvenVerified email at kuleuven.be
Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Jan CamenischDFINITYVerified email at dfinity.org
Zhaohui ChengLecturer of Computer Science, Middlesex UniversityVerified email at olymtech.net
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Christian WachsmannIntel Germany GmbH & Co. KGVerified email at intel.com
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Hoon Wei LimSingtelVerified email at singtel.com
Dan PageComputer Science, University of BristolVerified email at cs.bris.ac.uk
Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu