Crea il mio profilo
Accesso pubblico
Visualizza tutto39 articoli
13 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nigel SmartKU LeuvenEmail verificata su kuleuven.be
- Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su bham.ac.uk
- Jan CamenischDFINITYEmail verificata su dfinity.org
- Chris MitchellProfessor of Computer Science, Royal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Zhaohui ChengLecturer of Computer Science, Middlesex UniversityEmail verificata su olymtech.net
- Changyu DongGuangzhou UniversityEmail verificata su gzhu.edu.cn
- Helen TreharneProfessor, Surrey Centre for Cyber SecurityEmail verificata su surrey.ac.uk
- Tang QiangLuxembourg institute of Science and TechnologyEmail verificata su list.lu
- Marco Casassa MontPrincipal Cyber Security Consultant & ManagerEmail verificata su bmtglobal.com
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
- Guilin WangHuawei International Pte Ltd, SingaporeEmail verificata su huawei.com
- Ben SmythFounder-CEO, x26.ioEmail verificata su bensmyth.com
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
- Keith M. MartinRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Bogdan WarinschiUniversity of Bristol and DfinityEmail verificata su cs.bris.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickEmail verificata su warwick.ac.uk
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongEmail verificata su uow.edu.au
- Christian WachsmannIntel CorporationEmail verificata su intel.com
- Hoon Wei LimSingtelEmail verificata su singtel.com
- Daniel PageComputer Science, University of BristolEmail verificata su cs.bris.ac.uk