Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
Willi MeierFHNWVerified email at fhnw.ch
Jonathan SönnerupPhD student in computer security, Lund UniversityVerified email at eit.lth.se
Paul Stankovski WagnerAssociate Professor, Docent/Reader, Lund UniversityVerified email at eit.lth.se
Pegah Nikbakht BidehPh.D student, Lund universityVerified email at eit.lth.se
Linus KarlssonPhD Student, Computer SecurityVerified email at eit.lth.se
Hirotaka YoshidaAISTVerified email at aist.go.jp
Martin HöstMalmö UniversityVerified email at mau.se
Subhamoy MaitraIndian Statistical InstituteVerified email at isical.ac.in
Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenVerified email at kth.se
Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
Thomas OlssonRobert Bosch ABVerified email at se.bosch.com
Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
Kishan Chand GuptaProfessor, Indian Statistical InstituteVerified email at isical.ac.in
Yassir NawazStrategic Technology & Innovation Center, Pitney Bowes Inc.Verified email at pb.com
Carl LöndahlCryptography, biometryVerified email at eit.lth.se
Nicolae PaladiLund University and CanaryBitVerified email at eit.lth.se
Joakim Brorssonphd student, Lund UniversityVerified email at eit.lth.se