Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Edward DawsonEmeritus Professor Queensland University of TechnologyVerified email at qut.edu.au
- Juan GonzalezTeron LabsVerified email at teronlabs.com
- Douglas StebilaUniversity of WaterlooVerified email at uwaterloo.ca
- Anish MathuriaProfessor, DA-IICTVerified email at daiict.ac.in
- Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
- Kapali ViswanathanSiemens TechnologyVerified email at siemens.com
- Wageeh BolesFull Professor, Queensland University of TechnologyVerified email at qut.edu.au
- Hussain NyeemPhD, Queensland University of Technology, AustraliaVerified email at eece.mist.ac.bd
- M Choudary GorantlaFinastraVerified email at finastra.com
- Kenny PatersonProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Craig CostelloPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
- Ian H. WittenProfessor of Computer Science, University of Waikato, New ZealandVerified email at waikato.ac.nz
- Sherman S. M. ChowInformation Engineering, The Chinese University of Hong KongVerified email at ie.cuhk.edu.hk
- Anthony J MaederEmeritus Professor, Flinders UniversityVerified email at flinders.edu.au
- Andrew P. BradleyWhipbird SignalsVerified email at ieee.org
- Jason A. DowlingCommonwealth Scientific and Industrial Research Organisation (CSIRO), AustraliaVerified email at csiro.au
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Irfan AhmedVirginia Commonwealth UniversityVerified email at vcu.edu