Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Malcolm HeywoodProfessor, Computer Science, Dalhousie UniversityVerified email at cs.dal.ca
Atif KhanComputer Science, University of WaterlooVerified email at uwaterloo.ca
Kate LarsonUniversity of WaterlooVerified email at uwaterloo.ca
Hadi HosseiniPenn State UniversityVerified email at psu.edu
Daniel LizotteAssociate Professor of Computer Science; Associate Professor of Epidemiology and BiostatisticsVerified email at uwo.ca
Alan TsangCarleton UniversityVerified email at carleton.ca
Catherine HollowayGraduate Student, Institute for Quantum ComputingVerified email at iqc.ca
Christopher ErvenCEO, KETS Quantum Security Ltd;Verified email at kets-quantum.com
Cecylia BocovichThe Tor ProjectVerified email at uwaterloo.ca
Steven J. MurdochDepartment of Computer Science, University College LondonVerified email at ucl.ac.uk
Tariq ElahiAssistant Professor in Cybersecurity and Privacy, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Hooman Mohajeri MoghaddamPrinceton University, International Computer Science Institute (ICSI),Verified email at princeton.edu
John ChampaignMassachusetts Institute of TechnologyVerified email at mit.edu
Darren AbramsonDirector AI, AlexiVerified email at alexi.com
Sawyer WeldenVerified email at wakehealth.edu