Get my own profile
Public access
View all50 articles
13 articles
available
not available
Based on funding mandates
Co-authors
Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Nigel SmartKU LeuvenVerified email at kuleuven.be
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Jan CamenischDFINITYVerified email at dfinity.org
Zhaohui ChengLecturer of Computer Science, Middlesex UniversityVerified email at olymtech.net
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Christian WachsmannIntel Germany GmbH & Co. KGVerified email at intel.com
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Dan PageComputer Science, University of BristolVerified email at cs.bris.ac.uk
Hoon Wei LimSingtelVerified email at singtel.com