Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
Bruno BlanchetSenior researcher, INRIA, ParisVerified email at inria.fr
Elizabeth QuagliaReader, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Steve KremerInriaVerified email at inria.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Yoshikazu HanataniToshiba corporationVerified email at toshiba.co.jp
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Steven FrinkPh.D. student, Cornell UniversityVerified email at cs.cornell.edu
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Olivier PereiraUCLouvainVerified email at uclouvain.be
Yuichi KomanoChiba Institute of TechnologyVerified email at ruri.waseda.jp
Alfredo PirontiIOActiveVerified email at inria.fr
Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
Georgios PaschosDirector, Research Science, AmazonVerified email at amazon.lu