Get my own profile
Public access
View all30 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Markus KuhnDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
Fabien A. P. PetitcolasSmals ResearchVerified email at smals.be
Ilia ShumailovGoogle DeepMindVerified email at google.com
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Robert MullinsDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
Sergei SkorobogatovCambridge Research and EngineeringVerified email at hushmail.com
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Jeff YanProfessor of Cyber SecurityVerified email at acm.org
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
Simon MooreProfessor of Computer Engineering, University of CambridgeVerified email at cl.cam.ac.uk
J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityVerified email at cl.cam.ac.uk
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Harry ManifavasSenior Research Collaborator @ ICS-FORTHVerified email at ics.forth.gr
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk