Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Zhengyu ZhaoXi'an Jiaotong University, ChinaEmail verificata su xjtu.edu.cn
- Martha LarsonRadboud UniversityEmail verificata su ru.nl
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Niels SamwelRadboud UniversityEmail verificata su cs.ru.nl
- Weissbart LéoPhD candidateEmail verificata su cs.ru.nl
- Rui WenCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Tianhao WangUniversity of VirginiaEmail verificata su virginia.edu
- Tom HeskesProfessor of Computer Science and Artificial Intelligence, Radboud University NijmegenEmail verificata su science.ru.nl
- Twan van LaarhovenRadboud University NijmegenEmail verificata su cs.ru.nl
- Veelasha MoonsamyProfessor at Ruhr University Bochum, GermanyEmail verificata su veelasha.org
- Hamid BostaniPhD Candidate in the Digital Security Group, Radboud University, The NetherlandsEmail verificata su ru.nl
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de