Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Thomas JohanssonDept of EIT, Lund University, SwedenVerified email at eit.lth.se
- Qian GuoLund UniversityVerified email at eit.lth.se
- Martin HellAssociate Professor, Lund UniversityVerified email at eit.lth.se
- Linus KarlssonPhD Student, Computer SecurityVerified email at eit.lth.se
- Joakim Brorssonphd student, Lund UniversityVerified email at eit.lth.se
- Tomas Fabsicresearcher, Slovak University of TechnologyVerified email at stuba.sk
- Bernardo DavidAssociate Professor, IT University of CopenhagenVerified email at itu.dk
- Elena PagninChalmers University of TechnologyVerified email at chalmers.se
- Alessandro BudroniSenior Cryptography Engineer, Technology Innovation InstituteVerified email at tii.ae
- Alexander NilssonPhD Researcher in Cryptography, Lund UniversityVerified email at eit.lth.se
- Lorenzo GentileResearch Engineer at ConsensysVerified email at consensys.net
- Sushmita RujSenior Lecturer, UNSW, SydneyVerified email at unsw.edu.au
- johannes svenssonResearcher, Lund UniversityVerified email at eit.lth.se
- Anil W. DeyIntel CorporationVerified email at intel.com
- Mattias BorgLund UniversityVerified email at eit.lth.se
- Fredrik KopschResearcher, Royal Institute of TechnologyVerified email at abe.kth.se
- Marcelo Corrales CompagnucciAssociate Professor & Associate Director, Centre for Advanced Studies on Bioscience Innovation LawVerified email at jur.ku.dk
- Kacper SzkalejUniversity of AmsterdamVerified email at uva.nl
- Timo MinssenLaw Professor, CeBIL Director, University of Copenhagen; Research Affiliate, University of CambridgeVerified email at jur.ku.dk
- Mark FenwickProfessor, Faculty of Law, Kyushu UniversityVerified email at law.kyushu-u.ac.jp
Follow
Paul Stankovski Wagner
Associate Professor, Docent/Reader, Lund University
Verified email at eit.lth.se - Homepage