Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
Willi MeierFHNWVerified email at fhnw.ch
Paul Stankovski WagnerAssociate Professor, Lund UniversityVerified email at eit.lth.se
Jonathan SönnerupPhD student in computer security, Lund UniversityVerified email at eit.lth.se
Pegah Nikbakht BidehPh.D student, Lund universityVerified email at eit.lth.se
Linus KarlssonPhD Student, Computer SecurityVerified email at eit.lth.se
Hirotaka YoshidaAISTVerified email at aist.go.jp
Subhamoy MaitraIndian Statistical InstituteVerified email at isical.ac.in
Martin HöstLund UniversityVerified email at cs.lth.se
Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenVerified email at kth.se
Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
Kishan Chand GuptaProfessor, Indian Statistical InstituteVerified email at isical.ac.in
Yassir NawazStrategic Technology & Innovation Center, Pitney Bowes Inc.Verified email at pb.com
Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
Thomas OlssonRobert Bosch ABVerified email at se.bosch.com
Carl LöndahlCryptography, biometryVerified email at eit.lth.se
Nicolae PaladiLund University and CanaryBitVerified email at eit.lth.se
Joakim Brorssonphd student, Lund UniversityVerified email at eit.lth.se