Crea il mio profilo
Accesso pubblico
Visualizza tutto58 articoli
16 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonEmail verificata su rhul.ac.uk
Nigel SmartKU LeuvenEmail verificata su kuleuven.be
Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su cs.bham.ac.uk
Jan CamenischDFINITYEmail verificata su dfinity.org
Zhaohui ChengLecturer of Computer Science, Middlesex UniversityEmail verificata su olymtech.net
Changyu DongGuangzhou UniversityEmail verificata su gzhu.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityEmail verificata su surrey.ac.uk
Tang QiangLuxembourg institute of Science and TechnologyEmail verificata su list.lu
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerEmail verificata su bmtglobal.com
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
Guilin WangHuawei International Pte Ltd, SingaporeEmail verificata su huawei.com
Ben SmythFounder-CEO, x26.ioEmail verificata su bensmyth.com
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
Keith M. MartinRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
Bogdan WarinschiUniversity of Bristol and DfinityEmail verificata su cs.bris.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickEmail verificata su warwick.ac.uk
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongEmail verificata su uow.edu.au
Christian WachsmannIntel CorporationEmail verificata su intel.com
Hoon Wei LimSingtelEmail verificata su singtel.com
Dan PageComputer Science, University of BristolEmail verificata su cs.bris.ac.uk