Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentEmail verificata su kent.ac.uk
- Mattavelli MarcoMER, Ecole Polytechnique Federale de Lausanne, EPFLEmail verificata su epfl.ch
- Roland SchmitzProfessor für Internet-Sicherheit, Hochschule der Medien, StuttgartEmail verificata su hdm-stuttgart.de
- C.-C. Jay KuoMing Hsieh Chair Professor in ECE-Systems, University of Southern CaliforniaEmail verificata su sipi.usc.edu
- Dietmar SaupeProfessor of Computer Science, University of Konstanz, GermanyEmail verificata su uni-konstanz.de
- Saeed UllahUniversity of Derby, UKEmail verificata su derby.ac.uk
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtEmail verificata su encrypto.cs.tu-darmstadt.de
- Simone Casale-BrunetEPFLEmail verificata su epfl.ch
- Endri BezatiComputing System Laboratory, Huawei Technologies ZurichEmail verificata su epfl.ch
- Ihab AmerAdvanced Micro Device (AMD)Email verificata su amd.com
- Schuyler QuackenbushAudio Research LabsEmail verificata su audioresearchlabs.com
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonEmail verificata su city.ac.uk
- Hassaan Khaliq Qureshi (Professor)SEECS, National University of Science and Technology (NUST), Islamabad, PakistanEmail verificata su seecs.edu.pk
- Veselin RakocevicDepartment of Engineering, City, University of LondonEmail verificata su city.ac.uk