Get my own profile
Public access
View all16 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jens GrothChief Scientist, NexusVerified email at ucl.ac.uk
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
Andrea CerulliDFINITYVerified email at dfinity.org
Nigel SmartKU LeuvenVerified email at kuleuven.be
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Andrew McCarthySenior Lecturer, University of the West of EnglandVerified email at uwe.ac.uk
Phil LeggProfessor in Cyber Security, University of the West of EnglandVerified email at uwe.ac.uk
Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
Georg FuchsbauerTU WienVerified email at ist.ac.at
Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
James DavenportHebron & Medlock Professor of Information Technology, University of Bath; former Vice-President, BCSVerified email at bath.ac.uk
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Hanen Boussi RahmouniUniversity of Tunis el ManarVerified email at istmt.utm.tn
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
Sabri BarbariaLRBTMVerified email at istmt.utm.tn
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Santeri PaavolainenAalto UniversityVerified email at aalto.fi
Christopher CarrUniversity of Exeter, UKVerified email at exeter.ac.uk