Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
- Stephan WesemeyerUniversity of SurreyVerified email at surrey.ac.uk
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
- Andrew PaverdMicrosoftVerified email at microsoft.com
- Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
- Jens BendispostoVerified email at cs.uni-duesseldorf.de
- Jaco van de PolProfessor of Computer Science, Aarhus UniversityVerified email at cs.au.dk
- Jeroen MeijerEijsinkVerified email at eijsink.nl
- Michael LeuschelHeinrich-Heine Universität DüsseldorfVerified email at hhu.de
- Philipp KörnerResearcher, Heinrich-Heine University, DüsseldorfVerified email at hhu.de