Get my own profile
Public access
View all17 articles
11 articles
available
not available
Based on funding mandates
Co-authors
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Professor Zhiming Liu - 刘志明Southwest University, Chongqing, ChinaVerified email at swu.edu.cn
John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Iryna YevseyevaDe Montfort University, LeicesterVerified email at dmu.ac.uk
Volker StolzHøgskulen på Vestlandet & Universitetet i OsloVerified email at foldr.org
Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
Luca ArnaboldiAssistant Professor, University of BirminghamVerified email at bham.ac.uk
Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
Ian MolloyIBM ResearchVerified email at us.ibm.com
Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
Suliman A. AlsuhibanyProfessor, Computer Science Department, College of Computer, Qassim UniversityVerified email at qu.edu.sa
Andreas GriesmayerImperial College LondonVerified email at arm.com
Follow