Get my own profile
Public access
View all51 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Peter Browne RønneResearcherVerified email at nbi.dk
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Jeremy BryansResearch Fellow, Coventry University, UKVerified email at coventry.ac.uk
Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
Maciej KoutnyNewcastle UniversityVerified email at ncl.ac.uk
Jeremy ClarkConcordia UniversityVerified email at concordia.ca
Philip B. StarkProfessor of Statistics, University of California, BerkeleyVerified email at stat.berkeley.edu
Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
Alan T. ShermanProfessor of Computer Science, Dept. of CSEE, University of Maryland, Baltimore CountyVerified email at umbc.edu
Aleksander EssexAssociate Professor of Software Engineering, Western University CanadaVerified email at uwo.ca
Stefan PopoveniucVerified email at gwu.edu
Wojciech JamrogaPolish Academy of SciencesVerified email at ipipan.waw.pl
Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Giampaolo BellaUniversity of CataniaVerified email at dmi.unict.it
Follow
Peter Ryan
Professor of applied security, university of luxembourg
Verified email at uni.lu - Homepage