Get my own profile
Public access
View all14 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Ludovic PerretEPITA/LREVerified email at epita.fr
Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
Shinsaku KiyomotoKDDI Research Inc.Verified email at kddi-research.jp
Arman (MHR) KhouzaniSenior Lecturer, Victoria University of WellingtonVerified email at vuw.ac.nz
Simon R. BlackburnRoyal Holloway University of LondonVerified email at rhul.ac.uk
Christian JansonResearch Group Leader, Technische Universität Darmstadt (TU Darmstadt), GermanyVerified email at tu-darmstadt.de
Vladimir GerdtJoint Institute for Nuclear ResearchVerified email at jinr.ru
Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Jonathan KatzProfessor of Computer Science, University of MarylandVerified email at cs.umd.edu
Ranjit KumaresanVerified email at csail.mit.edu
James AldermanThales Cyber and Consulting (UK)Verified email at live.rhul.ac.uk
Gaëtan LeurentINRIAVerified email at inria.fr
Piotr MardzielindependentVerified email at cmu.edu
Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterVerified email at us.ibm.com
Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZVerified email at math.auckland.ac.nz