Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at cs.bham.ac.uk
Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
Bruno BlanchetSenior researcher, INRIA, ParisVerified email at inria.fr
Elizabeth QuagliaReader, Royal Holloway, University of LondonVerified email at rhul.ac.uk
Steve KremerInriaVerified email at inria.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityVerified email at cornell.edu
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Steven FrinkPh.D. student, Cornell UniversityVerified email at cs.cornell.edu
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Olivier PereiraUCLouvainVerified email at uclouvain.be
Alfredo PirontiINRIA, FranceVerified email at inria.fr
Yuichi KomanoChiba Institute of TechnologyVerified email at ruri.waseda.jp
Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
Georgios PaschosDirector, Research Science, AmazonVerified email at amazon.lu
Jérémie LeguayHuawei TechnologiesVerified email at huawei.com