Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thomas JohanssonDept of EIT, Lund University, SwedenEmail verificata su eit.lth.se
- Qian GuoLund UniversityEmail verificata su eit.lth.se
- Martin HellAssociate Professor, Lund UniversityEmail verificata su eit.lth.se
- Linus KarlssonPhD Student, Computer SecurityEmail verificata su eit.lth.se
- Tomas Fabsicresearcher, Slovak University of TechnologyEmail verificata su stuba.sk
- Joakim Brorssonphd student, Lund UniversityEmail verificata su eit.lth.se
- Alessandro BudroniSenior Cryptography Engineer, Technology Innovation InstituteEmail verificata su tii.ae
- Alexander NilssonPhD Researcher in Cryptography, Lund UniversityEmail verificata su eit.lth.se
- Sushmita RujSenior Lecturer, UNSW, SydneyEmail verificata su unsw.edu.au
- Anil W. DeyIntel CorporationEmail verificata su intel.com
- johannes svenssonResearcher, Lund UniversityEmail verificata su eit.lth.se
- Mattias BorgLund UniversityEmail verificata su eit.lth.se
- Fredrik KopschResearcher, Royal Institute of TechnologyEmail verificata su abe.kth.se
Segui
Paul Stankovski Wagner
Associate Professor, Lund University
Email verificata su eit.lth.se - Home page