Get my own profile
Public access
View all39 articles
13 articles
available
not available
Based on funding mandates
Co-authors
Nigel SmartKU LeuvenVerified email at kuleuven.be
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Jan CamenischDFINITYVerified email at dfinity.org
Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Zhaohui ChengLecturer of Computer Science, Middlesex UniversityVerified email at olymtech.net
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Guilin WangHuawei International Pte Ltd, SingaporeVerified email at huawei.com
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Christian WachsmannIntel CorporationVerified email at intel.com
Daniel PageSchool of Computer Science, University of BristolVerified email at cs.bris.ac.uk
Hoon Wei LimSingtelVerified email at singtel.com