Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Colin BoydNorwegian University of Science and TechnologyVerified email at item.ntnu.no
- Gareth T. DaviesNXP SemiconductorsVerified email at nxp.com
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Tibor JagerUniversity of WuppertalVerified email at uni-wuppertal.de
- Christopher CarrUniversity of Exeter, UKVerified email at exeter.ac.uk
- S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
- Peter Browne RønneResearcherVerified email at nbi.dk
- Mohsen TooraniAssociate Professor, University of South-Eastern Norway (USN)Verified email at usn.no
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Katriel Cohn-GordonMetaVerified email at katriel.co.uk
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
- Rene PeraltaNISTVerified email at nist.gov
- James AspnesYale UniversityVerified email at yale.edu
- Håvard RaddumSimula Research LaboratoryVerified email at simula.no
- Clementine GrittiLecturer, University of CanterburyVerified email at canterbury.ac.nz
- Anamaria CostacheNorwegian University of Science and TechnologyVerified email at ntnu.no