Crea il mio profilo
Accesso pubblico
Visualizza tutto34 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Daniel GrussGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Raoul StrackxFortanixEmail verificata su fortanix.com
- Yuval YaromRuhr University BochumEmail verificata su rub.de
- Daniel GenkinGeorgia TechEmail verificata su gatech.edu
- Marina MinkinUniversity of MichiganEmail verificata su umich.edu
- Jan Tobias MuehlbergResearcher in Computer Science, Universite Libre Bruxelles & KU Leuven, BelgiumEmail verificata su ulb.be
- Michael SchwarzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Moritz LippEmail verificata su mlq.me
- Daniel MoghimiGoogleEmail verificata su google.com
- Mark SilbersteinAssociate Professor, Technion, IsraelEmail verificata su ee.technion.ac.il
- David OswaldSecurity and Privacy Group, University of BirminghamEmail verificata su bham.ac.uk
- Thomas F. WenischProf. of CSE, University of MichiganEmail verificata su umich.edu
- Ofir WeisseUniversity of MichiganEmail verificata su umich.edu
- Flavio D. GarciaProfessor of Computer Security, University of BirminghamEmail verificata su bham.ac.uk
- Claudio CanellaAmazon Web ServicesEmail verificata su amazon.com
- Julian StecklinaEngineer at Cyberus TechnologyEmail verificata su os.inf.tu-dresden.de
- Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergEmail verificata su cs.fau.de
- Nico WeichbrodtTU Braunschweig, IBREmail verificata su ibr.cs.tu-bs.de