Get my own profile
Public access
View all21 articles
1 article
available
not available
Based on funding mandates
Co-authors
Markus KuhnComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Fabien A. P. PetitcolasOneSpanVerified email at onespan.com
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
F StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Sergei SkorobogatovUniversity of Cambridge, Dept of Computer Science and TechnologyVerified email at cam.ac.uk
Lars Ramkilde KnudsenDTUVerified email at dtu.dk
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Jeff YanProfessor of Cyber SecurityVerified email at acm.org
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Robert MullinsComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Simon MooreProfessor of Computer Engineering, University of CambridgeVerified email at cl.cam.ac.uk
Harry ManifavasSenior Research Collaborator @ ICS-FORTHVerified email at ics.forth.gr
George DanezisUniversity College LondonVerified email at ucl.ac.uk
Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityVerified email at cl.cam.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Ross Anderson
Verified email at cl.cam.ac.uk - Homepage