Get my own profile
Public access
View all15 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
- Qian GuoLund UniversityVerified email at eit.lth.se
- Martin HellAssociate Professor, Lund UniversityVerified email at eit.lth.se
- Linus KarlssonPhD Student, Computer SecurityVerified email at eit.lth.se
- Tomas Fabsicresearcher, Slovak University of TechnologyVerified email at stuba.sk
- Joakim Brorssonphd student, Lund UniversityVerified email at eit.lth.se
- Alessandro BudroniSenior Cryptography Engineer, Technology Innovation InstituteVerified email at tii.ae
- Alexander NilssonPhD Researcher in Cryptography, Lund UniversityVerified email at eit.lth.se
- Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
- Anil W. DeyIntel CorporationVerified email at intel.com
- johannes svenssonResearcher, Lund UniversityVerified email at eit.lth.se
- Mattias BorgLund UniversityVerified email at eit.lth.se
- Fredrik KopschResearcher, Royal Institute of TechnologyVerified email at abe.kth.se
Follow