Get my own profile
Public access
View all16 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jens GrothPrincipal Researcher, DFINITYVerified email at ucl.ac.uk
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
Andrea CerulliUniversity College LondonVerified email at dfinity.org
Nigel SmartKU LeuvenVerified email at kuleuven.be
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Georg FuchsbauerTU WienVerified email at ist.ac.at
Christophe PetitUniversité libre de Bruxelles - University of Birmingham - University of OxfordVerified email at ulb.be
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
James DavenportHebron & Medlock Professor of Information Technology, University of Bath; former Vice-President, BCSVerified email at bath.ac.uk
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Phil LeggProfessor in Cyber Security, University of the West of EnglandVerified email at uwe.ac.uk
Andrew McCarthyPost Graduate Researcher, University of the West of EnglandVerified email at uwe.ac.uk