Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
- Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
- Ludovic PerretEPITA/LREVerified email at epita.fr
- Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
- Shinsaku KiyomotoKDDI Research Inc.Verified email at kddi-research.jp
- Arman (MHR) KhouzaniSenior Lecturer, Victoria University of WellingtonVerified email at vuw.ac.nz
- Simon R. BlackburnRoyal Holloway University of LondonVerified email at rhul.ac.uk
- Christian JansonResearch Group Leader, Technische Universität Darmstadt (TU Darmstadt), GermanyVerified email at tu-darmstadt.de
- Vladimir GerdtJoint Institute for Nuclear ResearchVerified email at jinr.ru
- Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
- Ranjit KumaresanVerified email at csail.mit.edu
- James AldermanThales Cyber and Consulting (UK)Verified email at live.rhul.ac.uk
- Gaëtan LeurentINRIAVerified email at inria.fr
- Piotr MardzielindependentVerified email at cmu.edu
- Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
- Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZVerified email at math.auckland.ac.nz