Get my own profile
Public access
View all18 articles
1 article
available
not available
Based on funding mandates
Co-authors
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Ian BrownResearch ICT AfricaVerified email at researchictafrica.net
Thomas NymanL M EricssonVerified email at ericsson.com
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Santiago Zanella-BéguelinMicrosoft ResearchVerified email at microsoft.com
Shruti TopleAzure Research, MicrosoftVerified email at microsoft.com
Boris KöpfAzure Research, MicrosoftVerified email at microsoft.com
Arseny KurnikovPhD student, Aalto UniversityVerified email at aalto.fi
Jan-Erik EkbergHead of Mobile Security, Huawei FinlandVerified email at huawei.com
Ghada DessoukyTU Darmstadt | GoogleVerified email at trust.tu-darmstadt.de
Jian LiuProfessor at Zhejiang UniversityVerified email at zju.edu.cn
Victor RuehleVerified email at microsoft.com
Mohammad MannanProfessor, CIISE, Concordia University, CanadaVerified email at ciise.concordia.ca
Andrew SimpsonUniversity Lecturer in Software Engineering, Department of Computer Science, University of OxfordVerified email at cs.ox.ac.uk
Robin AnkeleUniversity of OxfordVerified email at cs.ox.ac.uk
Dr. Kubilay Ahmet Küçük (DPhil PhD)University of Oxford, Department of Computer Science, Cyber Security CentreVerified email at cs.ox.ac.uk
Fritz Alderimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be