Get my own profile
Public access
View all54 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Ioana BoureanuProfessor, University of SurreyVerified email at surrey.ac.uk
Pascal JunodApplied CryptographerVerified email at junod.info
Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
Pouyan SepehrdadSenior Staff Engineer / Manager at Qualcomm Technologies Inc.Verified email at qti.qualcomm.com
Gildas AvoineINSA Rennes, IRISA, CNRSVerified email at irisa.fr
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Thomas BaignèresOlvidVerified email at olvid.io
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Mike JustAssociate Professor, Computer Science, Heriot-Watt UniversityVerified email at hw.ac.uk
Christos DimitrakakisProfessor, University of NeuchatelVerified email at alumni.epfl.ch
Matthieu FiniaszSecurity ExpertVerified email at olvid.io
Rafik Chaabouni, PhDCyber Security and CryptographyVerified email at chaabouni.ch
Douglas StinsonProfessor Emeritus, David R. Cheriton School of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Paulo MateusProfessor of Logic and Computation, Instituto Superior Técnico, Lisboa, PortugalVerified email at math.ist.utl.pt
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Marko VukolićConsensusLabVerified email at acm.org
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Thomas PeyrinProfessor, Nanyang Technological UniversityVerified email at ntu.edu.sg
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr