Get my own profile
Public access
View all18 articles
10 articles
available
not available
Based on funding mandates
Co-authors
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
- Professor Zhiming Liu - 刘志明Southwest University, Chongqing, ChinaVerified email at swu.edu.cn
- John C. MaceLecturer in Security, Newcastle UniversityVerified email at ncl.ac.uk
- Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- Iryna YevseyevaDe Montfort University, LeicesterVerified email at dmu.ac.uk
- Volker StolzHøgskulen på Vestlandet & Universitetet i OsloVerified email at foldr.org
- Nicola ZannoneEindhoven University of TechnologyVerified email at tue.nl
- Luca ArnaboldiAssistant Professor, University of BirminghamVerified email at bham.ac.uk
- Jorge LoboICREA - Universitat Pompeu FabraVerified email at upf.edu
- Ian MolloyIBM ResearchVerified email at us.ibm.com
- Ilaria MatteucciIIT-CNRVerified email at iit.cnr.it
- Suliman A. AlsuhibanyProfessor, Computer Science Department, College of Computer, Qassim UniversityVerified email at qu.edu.sa
- Andreas GriesmayerImperial College LondonVerified email at arm.com
Follow