Crea il mio profilo
Accesso pubblico
Visualizza tutto38 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Peter RyanProfessor of applied security, university of luxembourgEmail verificata su uni.lu
- Thomas CreutzigProfessor of Mathematics at the University of AlbertaEmail verificata su ualberta.ca
- Yasuaki HikidaAssociate Professor, YITP, Kyoto UniversityEmail verificata su yukawa.kyoto-u.ac.jp
- Vincenzo IovinoAragon ZK ResearchEmail verificata su aragon.org
- Marie-Laure ZollingerUniversity of LuxembourgEmail verificata su uni.lu
- Thomas HainesAustralian National UniversityEmail verificata su anu.edu.au
- Johann GroßschädlResearch Specialist, University of LuxembourgEmail verificata su uni.lu
- Hao ChengUniversity of LuxembourgEmail verificata su uni.lu
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgEmail verificata su uni.lu
- Jan LagerwallUniversity of LuxembourgEmail verificata su lcsoftmatter.com
- Yong Genguniversity of luxembourgEmail verificata su uni.lu
- Alfredo RialUniversity of LuxembourgEmail verificata su uni.lu
- Kristian GjøsteenNTNUEmail verificata su ntnu.no
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Email verificata su ens.fr
- Carine LallemandEindhoven University of Technology & University of LuxembourgEmail verificata su tue.nl
- Verena DistlerUniversity of the Bundeswehr MunichEmail verificata su unibw.de
- Vincent KoenigUniversity of LuxembourgEmail verificata su uni.lu
- Wojciech JamrogaPolish Academy of SciencesEmail verificata su ipipan.waw.pl
- Niels ObersNiels Bohr Institute & NorditaEmail verificata su nbi.dk
- David Duenas-CidAssociate Prof., Director of the Public Sector Data-Driven Technologies Research CenterEmail verificata su kozminski.edu.pl