Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
- Michelle BlomSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Philip B. StarkProfessor of Statistics, University of California, BerkeleyVerified email at stat.berkeley.edu
- Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
- Peter StuckeyFaculty of Information Technology, Monash UniversityVerified email at monash.edu
- James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
- Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
- Olivier PereiraUCLouvainVerified email at uclouvain.be
- John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
- Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaVerified email at math.upenn.edu
- Benjamin I. P. RubinsteinProfessor, School of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Poorvi L. VoraDepartment of Computer Science, The George Washingtion UniversityVerified email at email.gwu.edu
- J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
- Sarah Jamie LewisOpen Privacy Research SocietyVerified email at openprivacy.ca
- Craig BurtonDept of Architecture, Monash UniversityVerified email at monash.edu
- Peter SchachteSchool of Computing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
- Dan S. WallachProfessor, Rice University, Department of Computer ScienceVerified email at cs.rice.edu
- Joseph HalpernProfessor of Computer Science, Cornell UniversityVerified email at cs.cornell.edu
- Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
Follow
Vanessa Teague
Thinking Cybersecurity and The Australian National University
Verified email at anu.edu.au - Homepage