Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
10 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKEmail verificata su bham.ac.uk
- Professor Zhiming Liu - 刘志明Southwest University, Chongqing, ChinaEmail verificata su swu.edu.cn
- John C. MaceLecturer in Security, Newcastle UniversityEmail verificata su ncl.ac.uk
- Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Iryna YevseyevaDe Montfort University, LeicesterEmail verificata su dmu.ac.uk
- Volker StolzHøgskulen på Vestlandet & Universitetet i OsloEmail verificata su foldr.org
- Nicola ZannoneEindhoven University of TechnologyEmail verificata su tue.nl
- Luca ArnaboldiAssistant Professor, University of BirminghamEmail verificata su bham.ac.uk
- Jorge LoboICREA - Universitat Pompeu FabraEmail verificata su upf.edu
- Ian MolloyIBM ResearchEmail verificata su us.ibm.com
- Ilaria MatteucciIIT-CNREmail verificata su iit.cnr.it
- Suliman A. AlsuhibanyProfessor, Computer Science Department, College of Computer, Qassim UniversityEmail verificata su qu.edu.sa
- Andreas GriesmayerImperial College LondonEmail verificata su arm.com
Segui