Get my own profile
Public access
View all24 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
Gareth T. DaviesNXP SemiconductorsVerified email at nxp.com
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Christopher CarrUniversity of Exeter, UKVerified email at exeter.ac.uk
Peter Browne RønneResearcherVerified email at nbi.dk
S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
Mohsen TooraniAssociate Professor, University of South-Eastern Norway (USN)Verified email at usn.no
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Katriel Cohn-GordonMetaVerified email at katriel.co.uk
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Rene PeraltaNISTVerified email at nist.gov
James AspnesYale UniversityVerified email at yale.edu
Clementine GrittiProfessor Junior, INSA LyonVerified email at insa-lyon.fr
Håvard RaddumSimula Research LaboratoryVerified email at simula.no
Anamaria CostacheNorwegian University of Science and TechnologyVerified email at ntnu.no