Get my own profile
Public access
View all14 articles
1 article
available
not available
Based on funding mandates
Co-authors
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Chris CulnaneUniversity of Melbourne (School of Computing and Information Systems)Verified email at unimelb.edu.au
Michelle BlomSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Philip B. StarkProfessor of Statistics, University of California, BerkeleyVerified email at stat.berkeley.edu
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Peter StuckeyFaculty of Information Technology, Monash UniversityVerified email at monash.edu
James HeatherSenior Lecturer in Computing, University of SurreyVerified email at surrey.ac.uk
Ronald L. RivestMIT Institute ProfessorVerified email at mit.edu
Olivier PereiraUCLouvainVerified email at uclouvain.be
John C MitchellProfessor of Computer Science, Stanford UniversityVerified email at Stanford.edu
Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaVerified email at math.upenn.edu
Benjamin I. P. RubinsteinProfessor, School of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Poorvi L. VoraDepartment of Computer Science, The George Washingtion UniversityVerified email at email.gwu.edu
J. Alex HaldermanUniversity of Michigan, Computer Science & EngineeringVerified email at umich.edu
Sarah Jamie LewisOpen Privacy Research SocietyVerified email at openprivacy.ca
Craig BurtonDept of Architecture, Monash UniversityVerified email at monash.edu
Peter SchachteSchool of Computing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
Dan S. WallachProfessor, Rice University, Department of Computer ScienceVerified email at cs.rice.edu
Joseph HalpernProfessor of Computer Science, Cornell UniversityVerified email at cs.cornell.edu
Melanie VolkamerKarlsruher Institut für TechnologieVerified email at kit.edu
Follow![Vanessa Teague](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=3CVS_xYAAAAJ&citpid=3)
Vanessa Teague
Thinking Cybersecurity and The Australian National University
Verified email at anu.edu.au - Homepage