Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Damian VizárData Security Scientist, CSEM SwitzerlandVerified email at csem.chWilly SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Serge VaudenayProfessor at EPFLVerified email at epfl.ch
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Elena AndreevaTU Wien (Technische Universität Wien)Verified email at tuwien.ac.at
Antoon PurnalPhD Researcher, imec-COSIC KU LeuvenVerified email at esat.kuleuven.be
Arnab RoyUniversität InnsbruckVerified email at uibk.ac.at
Bart MenninkDepartment of Advanced Computing Sciences, Maastricht UniversityVerified email at maastrichtuniversity.nl
Yi MuProfessorVerified email at cityu.mo
Phillip RogawayUC DavisVerified email at cs.ucdavis.edu
Viet Tung HoangAssociate Professor at Florida State UniversityVerified email at cs.fsu.eduDavid NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Kerem VarıcıMastercardVerified email at mastercard.com
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Ion BicaMilitary Technical AcademyVerified email at mta.ro
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Alan SzepieniecVerified email at neptune.cash
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu