Crea il mio profilo
Accesso pubblico
Visualizza tutto41 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Bart PreneelProfessor, KU LeuvenEmail verificata su esat.kuleuven.be
- Carmela TroncosoEPFLEmail verificata su epfl.ch
- Marc JuarezAssistant Professor, School of Informatics - University of EdinburghEmail verificata su ed.ac.uk
- Gunes AcarRadboud UniversityEmail verificata su cs.ru.nl
- George DanezisMysten Labs & University College LondonEmail verificata su ucl.ac.uk
- Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Email verificata su tudelft.nl
- Stefaan SeysKU LeuvenEmail verificata su esat.kuleuven.be
- Ero BalsaCornell TechEmail verificata su cornell.edu
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyEmail verificata su rit.edu
- Rachel GreenstadtComputer Science and Engineering Department, New York UniversityEmail verificata su nyu.edu
- Arvind NarayananAssociate Professor, Princeton UniversityEmail verificata su cs.princeton.edu
- Steven EnglehardtDuckDuckGoEmail verificata su princeton.edu
- Rafa Gálvez VizcaínoKU LeuvenEmail verificata su kuleuven.be
- Mohsen ImaniAnomali Inc.Email verificata su mavs.uta.edu
- Nick NikiforakisAssociate Professor, Stony Brook UniversityEmail verificata su cs.stonybrook.edu
- Sadia AfrozAvast, ICSIEmail verificata su icsi.berkeley.edu
- Paul SyversonMathematician, U.S. Naval Research LaboratoryEmail verificata su nrl.navy.mil
- Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryEmail verificata su nrl.navy.mil
- Tariq ElahiAssistant Professor, School of Informatics - University of EdinburghEmail verificata su ed.ac.uk