Get my own profile
Public access
View all13 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jens GrothChief Scientist, NexusVerified email at ucl.ac.uk
Jonathan BootleResearcher at IBM Research - ZurichVerified email at zurich.ibm.com
Andrea CerulliDFINITYVerified email at dfinity.org
Nigel SmartKU LeuvenVerified email at kuleuven.be
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Georg FuchsbauerTU WienVerified email at ist.ac.at
Andrew McCarthySenior Lecturer, University of the West of EnglandVerified email at uwe.ac.uk
Phil LeggProfessor in Cyber Security, University of the West of EnglandVerified email at uwe.ac.uk
Panagiotis AndriotisUniversity of BirminghamVerified email at bham.ac.uk
Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
James DavenportHebron & Medlock Professor of Information Technology, University of Bath; former Vice-President, BCSVerified email at bath.ac.uk
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Stephan KrennAIT Austrian Institute of Technology GmbHVerified email at ait.ac.at
Hanen Boussi RahmouniUniversity of Tunis el ManarVerified email at istmt.utm.tn
Marco Casassa MontPrincipal Cyber Security Consultant & ManagerVerified email at bmtglobal.com
Sabri BarbariaLRBTMVerified email at istmt.utm.tn
Santeri PaavolainenAalto UniversityVerified email at aalto.fi
Christopher CarrUniversity of Exeter, UKVerified email at exeter.ac.uk