Get my own profile
Public access
View all13 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Jens GrothChief Scientist, NexusVerified email at ucl.ac.uk
- Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
- Andrea CerulliDFINITYVerified email at dfinity.org
- Nigel SmartKU LeuvenVerified email at kuleuven.be
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Georg FuchsbauerTU WienVerified email at ist.ac.at
- Andrew McCarthySenior Lecturer, University of the West of EnglandVerified email at uwe.ac.uk
- Phil LeggProfessor in Cyber Security, University of the West of EnglandVerified email at uwe.ac.uk
- Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
- Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
- Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- James DavenportHebron & Medlock Professor of Information Technology, University of Bath; former Vice-President, BCSVerified email at bath.ac.uk
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
- Hanen Boussi RahmouniUniversity of Tunis el ManarVerified email at istmt.utm.tn
- Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
- Sabri BarbariaLRBTMVerified email at istmt.utm.tn
- Santeri PaavolainenAalto UniversityVerified email at aalto.fi
- Christopher CarrUniversity of Exeter, UKVerified email at exeter.ac.uk