Get my own profile
Public access
View all8 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Elisavet KonstantinouAssistant Professor, Dep. of Information & Communication Systems Engineering, Univ. of the AegeanVerified email at aegean.gr
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Hao ChengProfessor, Shandong UniversityVerified email at sdu.edu.cn
Marios AnagnostopoulosAssistant Professor, Democritus University of ThraceVerified email at ee.duth.gr
Peter Browne RønneResearcherVerified email at nbi.dk
Chloe MartindaleSenior Lecturer, University of BristolVerified email at tue.nl
Georgios KambourakisProfessor, Dept. of Information and Communication Systems Eng., University of the AegeanVerified email at aegean.gr
Anastasia DoumaDepartment of Information & Communication Systems Engineering, University of the AegeanVerified email at aegean.gr
Mónica P. ArenasUniverity of LuxembourgVerified email at uni.lu
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHVerified email at ubitech.eu
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Muhammed Ali BingolCryptographerVerified email at dmu.ac.uk
Diego F. AranhaAssociate Professor in Computer Science, Aarhus UniversityVerified email at cs.au.dk
Aurore GuillevicInria NancyVerified email at inria.fr
Daniel PageSchool of Computer Science, University of BristolVerified email at cs.bris.ac.uk
Mohammadamin RakeeiPh.D. Researcher at University of LuxembourgVerified email at uni.lu
Hüseyin DemirciCognifinity