Get my own profile
Public access
View all29 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Markus KuhnDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
Fabien A. P. PetitcolasSmals ResearchVerified email at smals.be
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Ilia ShumailovRS DeepMind, JRF Christ Church, University of Oxford; PhD, University of Cambridge; Fellow, VectorVerified email at cl.cam.ac.uk
Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Robert MullinsDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
Sergei SkorobogatovCambridge Research and EngineeringVerified email at hushmail.com
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Jeff YanProfessor of Cyber SecurityVerified email at acm.org
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Simon MooreProfessor of Computer Engineering, University of CambridgeVerified email at cl.cam.ac.uk
Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityVerified email at cl.cam.ac.uk
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
Harry ManifavasSenior Research Collaborator @ ICS-FORTHVerified email at ics.forth.gr