Get my own profile
Public access
View all29 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Markus KuhnDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
- Fabien A. P. PetitcolasSmals ResearchVerified email at smals.be
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
- Ilia ShumailovGoogle DeepMindVerified email at google.com
- Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
- Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
- Robert MullinsDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
- Sergei SkorobogatovCambridge Research and EngineeringVerified email at hushmail.com
- Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
- Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
- Jeff YanProfessor of Cyber SecurityVerified email at acm.org
- Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
- Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
- Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
- Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
- Simon MooreProfessor of Computer Engineering, University of CambridgeVerified email at cl.cam.ac.uk
- J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityVerified email at cl.cam.ac.uk
- Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
- Harry ManifavasSenior Research Collaborator @ ICS-FORTHVerified email at ics.forth.gr
- George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk