Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Göran SelanderEricssonVerified email at ericsson.com
- Mats NäslundKTH, Royal Institute of TechnologyVerified email at kth.se
- rolf j blomRISE Research Instirutes of SwedenVerified email at ri.se
- Ludwig SeitzCombitech ABVerified email at combitech.se
- Mališa Vučinić Research Scientist, InriaVerified email at inria.fr
- Erik ThormarkerSecurity Researcher, EricssonVerified email at ericsson.com
- Marco TilocaRISE Research Institutes of SwedenVerified email at ri.se
- salvatore loretoEricssonVerified email at ericsson.com
- Mohit SethiEricsson Finland, Aalto University Finland, KTH SwedenVerified email at aalto.fi
- Magnus WesterlundEricsson ResearchVerified email at ericsson.com
- Prajwol Kumar NakarmiStrategic Product Manager, RAN Security, EricssonVerified email at ericsson.com
- Michael LiljenstamPrincipal Researcher, EricssonVerified email at ericsson.com
- Thomas WatteyneInria, FranceVerified email at eecs.berkeley.edu
- Shahid RazaDirector of Cybersecurity Unit @ RISE Sweden | Professor of Cybersecurity, Mälardalen Uni. SwedenVerified email at ri.se
- Jari ArkkoEricssonVerified email at ericsson.com
- Gerald Q. Maguire Jr.Professor emeritus, KTH Royal Institute of Technology, School of Electrical Engineering and ComputerVerified email at kth.se
- Ari KeränenResearch Scientist at Ericsson Research Finland, NomadicLabVerified email at ericsson.com
- Matthew CampagnaAmazon Web ServicesVerified email at amazon.com
- Johan HåstadProfessor i teoretisk datalogi, KTHVerified email at kth.se
- Dan Garcia-CarrilloUniversidad de OviedoVerified email at uniovi.es
Follow
John Preuß Mattsson
Other namesJohn Preuss Mattsson, John Mattsson
Expert in Cryptographic Algorithms and Security Protocols, Ericsson Research
Verified email at ericsson.com - Homepage