Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Damian VizárData Security Scientist, CSEM SwitzerlandVerified email at csem.ch
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Serge VaudenayProfessor at EPFLVerified email at epfl.ch
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
- Shekh Faisal Abdul-LatipUniversiti Teknikal Malaysia MelakaVerified email at utem.edu.my
- Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- Yi MuProfessorVerified email at cityu.mo
- Antoon PurnalPhD Researcher, imec-COSIC KU LeuvenVerified email at esat.kuleuven.be
- Arnab RoyUniversität InnsbruckVerified email at uibk.ac.at
- Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
- Viet Tung HoangAssociate Professor at Florida State UniversityVerified email at cs.fsu.edu
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Kerem VarıcıMastercardVerified email at mastercard.com
- Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
- Ion BicaMilitary Technical AcademyVerified email at mta.ro
- Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
- Alan SzepieniecVerified email at neptune.cash
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu