Get my own profile
Public access
View all66 articles
19 articles
available
not available
Based on funding mandates
Co-authors
Weiqiang LiuProfessor, Nanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Chongyan GuSenior Lecturer (Associate Professor), CSIT, QUEEN'S UNIVERSITY BELFASTVerified email at qub.ac.uk
Dr. Ayesha KhalidSenior Lecturer @ Queens University Belfast (QUB), Belfast, NI, UKVerified email at qub.ac.uk
James HoweHead of Cryptography, SandboxAQVerified email at sandboxaq.com
Xiaolin CaoQueen's University of BelfastVerified email at qub.ac.uk
Kean Hong BoeySenior Design Engineer, Intel CorporationVerified email at intel.com
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
Ghazanfar Ali SafdarUniversity of BedfordshireVerified email at beds.ac.ukFatih KurugolluProfessor, University of SharjahVerified email at sharjah.ac.ae
Tim GüneysuSecurity Engineering, Ruhr-Universität BochumVerified email at rub.de
Roger WoodsProfessor at Queen's University BelfastVerified email at qub.ac.uk
William MarnaneDepartment of Electrical & Electronic Engineering , University College CorkVerified email at ucc.ie
Matthew RobshawTechnical Fellow, Impinj Inc.Verified email at impinj.com
Mark HamiltonUniversity College CorkVerified email at rennes.ucc.ie
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Michael TunstallCryptography ResearchVerified email at cryptography.coma yakovlevNewcastle UniversityVerified email at newcastle.ac.uk
Alex BystrovLecturer in Electronic Engineering, Newcastle University, UKVerified email at ncl.ac.uk
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de