Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
David AspinallProfessor in Computer Science, University of EdinburghVerified email at ed.ac.uk
Professor Lynne BaillieInteractive and Trustworthy Technologies Group, MACS, Heriot-Watt UniversityVerified email at hw.ac.uk
Nicholas MicallefPostdoctoral Researcher, New York University Abu DhabiVerified email at nyu.edu
Gunes KayacikAruba NetworksVerified email at hpe.com
Paul C. van OorschotProfessor of Computer Science, Carleton University, CanadaVerified email at scs.carleton.ca
Evangelos KranakisChancellor's Professor, School of Computer Science, Carleton UniversityVerified email at scs.carleton.ca
Ali AhmadiniaDepartment Chair, Computer Science, California State Universtiy San MarcosVerified email at csusm.edu
Serge VaudenayProfessor at EPFLVerified email at epfl.ch
Tao WanPrincipal Architect at CableLabsVerified email at cablelabs.com
Vashek MatyasMasaryk UniversityVerified email at fi.muni.cz
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Muhammad AdnanHigher Colleges of Technology, UAEVerified email at hct.ac.ae
Karen RenaudDivision of Cyber Security, Abertay UniversityVerified email at abertay.ac.uk
André ÅrnesTelenor Group, NTNUVerified email at ntnu.no
Martin HalveyReader (Associate Professor), University of StrathclydeVerified email at strath.ac.uk
Tessa BergAssociate Professor of Computer Sciences, Heriot-Watt UniversityVerified email at hw.ac.uk
Martin UkropUsable security researcher at CRoCS, Masaryk UniversityVerified email at mail.muni.cz
Andrea ErossHeriot-Watt UniversityVerified email at hw.ac.uk
Manuel MaarekHeriot-Watt UniversityVerified email at hw.ac.uk
David SmahelInterdisciplinary Research Team on Internet and Society (irtis.muni.cz), Masaryk UniversityVerified email at fss.muni.cz
Mike Just
Associate Professor, Computer Science, Heriot-Watt University
Verified email at hw.ac.uk - Homepage