Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
- Willi MeierFHNWVerified email at fhnw.ch
- Jonathan SönnerupPhD student in computer security, Lund UniversityVerified email at eit.lth.se
- Paul Stankovski WagnerAssociate Professor, Docent/Reader, Lund UniversityVerified email at eit.lth.se
- Pegah Nikbakht BidehPh.D student, Lund universityVerified email at eit.lth.se
- Linus KarlssonPhD Student, Computer SecurityVerified email at eit.lth.se
- Hirotaka YoshidaAISTVerified email at aist.go.jp
- Martin HöstMalmö UniversityVerified email at mau.se
- Subhamoy MaitraIndian Statistical InstituteVerified email at isical.ac.in
- Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenVerified email at kth.se
- Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
- Thomas OlssonRobert Bosch ABVerified email at se.bosch.com
- Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
- Kishan Chand GuptaProfessor, Indian Statistical InstituteVerified email at isical.ac.in
- Yassir NawazStrategic Technology & Innovation Center, Pitney Bowes Inc.Verified email at pb.com
- Carl LöndahlCryptography, biometryVerified email at eit.lth.se
- Nicolae PaladiLund University and CanaryBitVerified email at eit.lth.se
- Joakim Brorssonphd student, Lund UniversityVerified email at eit.lth.se