Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
Gareth T. DaviesNXP SemiconductorsVerified email at nxp.com
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Christopher CarrUniversity of Exeter, UKVerified email at exeter.ac.uk
S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
Mohsen TooraniAssociate Professor, University of South-Eastern NorwayVerified email at usn.no
Peter Browne RønneResearcherVerified email at nbi.dk
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Katriel Cohn-GordonIndependent ScholarVerified email at katriel.co.uk
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
Rene PeraltaNISTVerified email at nist.gov
James AspnesYale UniversityVerified email at yale.edu
Håvard RaddumSimula Research LaboratoryVerified email at simula.no
Clementine GrittiLecturer, University of CanterburyVerified email at canterbury.ac.nz
Anamaria CostacheNorwegian University of Science and TechnologyVerified email at ntnu.no