Get my own profile
Public access
View all51 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Budi AriefUniversity of KentVerified email at kent.ac.uk
Edward CartwrightProfessor of Economics, De Montfort UniversityVerified email at dmu.ac.uk
j.c.a. van der lubbeassociate professorVerified email at tudelft.nl
John A. ClarkProfessor of Computer and Information Security, University of SheffieldVerified email at sheffield.ac.uk
Orr DunkelmanComputer Science Dept., University of Haifa, IsraelVerified email at cs.haifa.ac.il
Margarita OsadchyComputer Science, University of HaifaVerified email at cs.haifa.ac.il
David L RobertsDurrell Institute of Conservation & Ecology, University of KentVerified email at kent.ac.uk
Seznec AndreINRIA/IRISAVerified email at inria.fr
David J. BarnesSenior Lecturer in Computer Science, University of KentVerified email at kent.ac.uk
Gildas AvoineINSA Rennes, IRISA, CNRSVerified email at irisa.fr
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Quisquater Jean-JacquesUniversité catholique de Louvain, UCL Crypto Group, professor em. of cryptography, securityVerified email at uclouvain.be
Eerke BoitenSchool of Computer Science and Informatics, De Montfort University, UKVerified email at dmu.ac.uk
Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
Joe R HarrisonUniversity of KentVerified email at kent.ac.uk
Christos DimitrakakisProfessor, University of NeuchatelVerified email at alumni.epfl.ch
Xavier CarpentUniversity of NottinghamVerified email at nottingham.ac.uk
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Mohamad MerhiPortsmouth UniversityVerified email at port.ac.uk
Philippe TeuwenQuarkslabVerified email at teuwen.org
Follow
Julio Hernandez-Castro
Professor of Computer Security, University of Kent
Verified email at kent.ac.uk