Get my own profile
Public access
View all27 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Markus KuhnComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Fabien A. P. PetitcolasOneSpanVerified email at onespan.com
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Ilia ShumailovJRF Christ Church, University of Oxford; PhD, University of Cambridge; Fellow, Vector InstituteVerified email at cl.cam.ac.uk
Lars Ramkilde KnudsenDTUVerified email at dtu.dk
Sergei SkorobogatovUniversity of Cambridge, Dept of Computer Science and TechnologyVerified email at cam.ac.uk
Robert MullinsComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Rainer BöhmeUniversität Innsbruck, AustriaVerified email at uibk.ac.at
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Jeff YanProfessor of Cyber SecurityVerified email at acm.org
Simon MooreProfessor of Computer Engineering, University of CambridgeVerified email at cl.cam.ac.uk
J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityVerified email at cl.cam.ac.uk
Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
Harry ManifavasSenior Research Collaborator @ ICS-FORTHVerified email at ics.forth.gr
Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu
George DanezisUniversity College LondonVerified email at ucl.ac.uk