Get my own profile
Public access
View all42 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Darren Hurley-SmithSenior Lecturer in Information Security, Royal HollowayVerified email at rhul.ac.uk
j.c.a. van der lubbeassociate professorVerified email at tudelft.nl
Budi AriefUniversity of KentVerified email at kent.ac.uk
Edward CartwrightProfessor of Economics, De Montfort UniversityVerified email at dmu.ac.uk
John A. ClarkProfessor of Computer and Information Security, University of SheffieldVerified email at sheffield.ac.uk
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Margarita OsadchyComputer Science, University of HaifaVerified email at cs.haifa.ac.il
David L RobertsDurrell Institute of Conservation & Ecology, University of KentVerified email at kent.ac.uk
Seznec AndreINRIA/IRISAVerified email at inria.fr
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Gildas AvoineINSA Rennes, IRISA, CNRSVerified email at irisa.fr
Quisquater Jean-JacquesUCL Crypto Group, professor em. of cryptography, securityVerified email at uclouvain.be
David J. BarnesSenior Lecturer in Computer Science, University of KentVerified email at kent.ac.uk
Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
Eerke BoitenSchool of Computer Science and Informatics, De Montfort University, UKVerified email at dmu.ac.uk
Christos DimitrakakisProfessor, University of NeuchatelVerified email at alumni.epfl.ch
Joe R HarrisonUniversity of KentVerified email at kent.ac.uk
Xavier CarpentUniversity of NottinghamVerified email at nottingham.ac.uk
Mohamad MerhiPortsmouth UniversityVerified email at port.ac.uk
Philippe TeuwenQuarkslabVerified email at teuwen.org
Follow
Julio Hernandez-Castro
Professor of Computer Security, University of Kent
Verified email at kent.ac.uk