Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mats NäslundKTH, Royal Institute of TechnologyVerified email at kth.se
- Ludwig SeitzCombitech ABVerified email at combitech.se
- John Preuß MattssonExpert in Cryptographic Algorithms and Security Protocols, Ericsson ResearchVerified email at ericsson.com
- Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenVerified email at kth.se
- rolf j blomRISE Research Instirutes of SwedenVerified email at ri.se
- Shahid RazaDirector of Cybersecurity Unit @ RISE Sweden | Professor of Cybersecurity, Mälardalen Uni. SwedenVerified email at ri.se
- Christian GehrmannLund UniversityVerified email at eit.lth.se
- Mališa Vučinić Research Scientist, InriaVerified email at inria.fr
- Marco TilocaRISE Research Institutes of SwedenVerified email at ri.se
- Lilian BossuetProfessor, University of Lyon, Saint-Etienne - Laboratoire Hubert Curien - CNRSVerified email at univ-st-etienne.fr
- Ravishankar BorgaonkarResearch Fellow, University of OxfordVerified email at cs.ox.ac.uk
- Sandeep KumarAssistant Professor at Panipat Institute of Engineering & Technology, SamalkhaVerified email at piet.co.in
- Jari ArkkoEricssonVerified email at ericsson.com
- Joachim SachsSenior Expert, EricssonVerified email at ericsson.com
- Teemu Rinta-ahoCimcorpVerified email at rinta-aho.org
- Thomas WatteyneInria, FranceVerified email at eecs.berkeley.edu
- Karl NorrmanSecurity Researcher, Ericsson Research and KTH Royal Instintute of TechnologyVerified email at ericsson.com