Get my own profile
Public access
View all58 articles
16 articles
available
not available
Based on funding mandates
Co-authors
Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Nigel SmartKU LeuvenVerified email at kuleuven.be
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Jan CamenischDFINITYVerified email at dfinity.org
Zhaohui ChengLecturer of Computer Science, Middlesex UniversityVerified email at olymtech.net
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Christian WachsmannIntel CorporationVerified email at intel.com
Hoon Wei LimSingtelVerified email at singtel.com
Dan PageComputer Science, University of BristolVerified email at cs.bris.ac.uk