Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mats NäslundKTH, Royal Institute of TechnologyVerified email at kth.se
- Ludwig SeitzCombitech ABVerified email at combitech.se
- John Preuß MattssonExpert in Cryptographic Algorithms and Security Protocols, Ericsson ResearchVerified email at ericsson.com
- Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenVerified email at kth.se
- rolf j blomRISE Research Instirutes of SwedenVerified email at ri.se
- Shahid RazaFull Professor & Cybersecurity Chair, University of Glasgow | Research Director Cybersecurity@RISEVerified email at glasgow.ac.uk
- Mališa Vučinić Research Scientist, InriaVerified email at inria.fr
- Christian GehrmannLund UniversityVerified email at eit.lth.se
- Marco TilocaRISE Research Institutes of SwedenVerified email at ri.se
- Thomas WatteyneInria, FranceVerified email at eecs.berkeley.edu
- Lilian BossuetProfessor, University Jean Monnet, Saint-Etienne - Laboratoire Hubert Curien - CNRSVerified email at univ-st-etienne.fr
- Ravishankar BorgaonkarResearch Fellow, University of OxfordVerified email at cs.ox.ac.uk
- Jari ArkkoEricssonVerified email at ericsson.com
- Joachim SachsSenior Expert, EricssonVerified email at ericsson.com
- Teemu Rinta-ahoCimcorpVerified email at rinta-aho.org
- Karl NorrmanSecurity Researcher, Ericsson Research and KTH Royal Instintute of TechnologyVerified email at ericsson.com
- Sandeep KumarAssistant Professor at Panipat Institute of Engineering & Technology, SamalkhaVerified email at piet.co.in