Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
Willi MeierFHNWVerified email at fhnw.ch
Paul Stankovski WagnerAssociate Professor, Lund UniversityVerified email at eit.lth.se
Jonathan SönnerupPhD student in computer security, Lund UniversityVerified email at eit.lth.se
Linus KarlssonPhD Student, Computer SecurityVerified email at eit.lth.se
Pegah Nikbakht BidehPh.D student, Lund universityVerified email at eit.lth.se
Subhamoy MaitraIndian Statistical InstituteVerified email at isical.ac.in
Hirotaka YoshidaAISTVerified email at aist.go.jp
Martin HöstLund UniversityVerified email at cs.lth.se
Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenVerified email at kth.se
Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
Kishan Chand GuptaProfessor, Indian Statistical InstituteVerified email at isical.ac.in
Yassir NawazStrategic Technology & Innovation Center, Pitney Bowes Inc.Verified email at pb.com
Thomas OlssonRISE Research Institutes of SwedenVerified email at ri.se
Carl LöndahlCryptography, biometryVerified email at eit.lth.se
Nicolae PaladiLund University and CanaryBitVerified email at eit.lth.se
Joakim Brorssonphd student, Lund UniversityVerified email at eit.lth.se