Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtEmail verificata su encrypto.cs.tu-darmstadt.de
- N. AsokanProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Jian LiuProfessor at Zhejiang UniversityEmail verificata su zju.edu.cn
- Daniel GüntherTechnical University of DarmstadtEmail verificata su encrypto.cs.tu-darmstadt.de
- Benny PinkasBar Ilan University and Aptos LabsEmail verificata su biu.ac.il
- Kimmo JärvinenXiphera Ltd.Email verificata su xiphera.com
- Juliane KrämerProfessor, University of RegensburgEmail verificata su ur.de
- Zheng YANGSouthwest UniversityEmail verificata su swu.edu.cn
- Oleksandr TkachenkoSoftware Engineer, DFINITYEmail verificata su dfinity.org
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsEmail verificata su tu-berlin.de
- Christian WeinertRoyal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Deevashwer RatheeUC BerkeleyEmail verificata su berkeley.edu
- Cristian-Alexandru StaicuCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Sazzadur RahamanAssistant Professor of Computer Science at The University of ArizonaEmail verificata su cs.arizona.edu
- Tommaso FrassettoBedrock Systems, Inc.Email verificata su bedrocksystems.com
- Ghada DessoukyTU Darmstadt | GoogleEmail verificata su trust.tu-darmstadt.de
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de