Get my own profile
Public access
View all29 articles
1 article
available
not available
Based on funding mandates
Co-authors
Markus KuhnDepartment of Computer Science and Technology, University of CambridgeVerified email at cl.cam.ac.uk
Fabien A. P. PetitcolasSmalsVerified email at smals.be
Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaVerified email at utulsa.edu
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Ilia ShumailovJRF Christ Church, University of Oxford; PhD, University of Cambridge; Fellow, Vector InstituteVerified email at cl.cam.ac.uk
Robert MullinsComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Sergei SkorobogatovCambridge Research and EngineeringVerified email at hushmail.com
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Jeff YanProfessor of Cyber SecurityVerified email at acm.org
Rainer BöhmeUniversität Innsbruck, MIT Media LabVerified email at uibk.ac.at
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Simon MooreProfessor of Computer Engineering, University of CambridgeVerified email at cl.cam.ac.uk
Steven BellovinProfessor of Computer Science, Columbia UniversityVerified email at cs.columbia.edu
J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityVerified email at cl.cam.ac.uk
Laurent SimonCambridge UniversityVerified email at cl.cam.ac.uk
Harry ManifavasSenior Research Collaborator @ ICS-FORTHVerified email at ics.forth.gr
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Joseph BonneauNew York UniversityVerified email at cs.nyu.edu