Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
- Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
- Bruno BlanchetSenior researcher, INRIA, ParisVerified email at inria.fr
- Elizabeth QuagliaReader, Royal Holloway, University of LondonVerified email at rhul.ac.uk
- Steve KremerInriaVerified email at inria.fr
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Yoshikazu HanataniToshiba corporationVerified email at toshiba.co.jp
- Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
- Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Steven FrinkPh.D. student, Cornell UniversityVerified email at cs.cornell.edu
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Olivier PereiraUCLouvainVerified email at uclouvain.be
- Alfredo PirontiINRIA, FranceVerified email at inria.fr
- Yuichi KomanoChiba Institute of TechnologyVerified email at ruri.waseda.jp
- Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
- Georgios PaschosDirector, Research Science, AmazonVerified email at amazon.lu