Crea il mio profilo
Accesso pubblico
Visualizza tutto32 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thomas PeyrinProfessor, Nanyang Technological UniversityEmail verificata su ntu.edu.sg
- Zhenzhen BaoTsinghua UniversityEmail verificata su tsinghua.edu.cn
- Ling SongJinan University, Guangzhou, ChinaEmail verificata su jnu.edu.cn
- Axel Y. PoschmannVP of ProductEmail verificata su pqshield.com
- S LingEmail verificata su ntu.edu.sg
- Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
- Huaxiong WangNanyang Technological University, SingaporeEmail verificata su ntu.edu.sg
- Jérémy JEANANSSIEmail verificata su ssi.gouv.fr
- Krystian MatusiewiczSecurity Researcher at IntelEmail verificata su intel.com
- Ivica NikolićNational University of SingaporeEmail verificata su nus.edu.sg
- Kexin QiaoChinese Academy of SciencesEmail verificata su iie.ac.cn
- Matthew RobshawTechnical Fellow, Impinj Inc.Email verificata su impinj.com
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Ron SteinfeldAssociate Professor, Monash UniversityEmail verificata su monash.edu
- Vincent RijmenUniversity of Leuven (KU Leuven)Email verificata su esat.kuleuven.be
- Bing SunNational University of Defense TechnologyEmail verificata su kuleuven.be
- Eik ListChair of Media Security, Bauhaus-Universität WeimarEmail verificata su uni-weimar.de
- guozhen liuShanghai Jiao Tong UniversityEmail verificata su sjtu.edu.cn
- Xiaoyang DongTsinghua UniversityEmail verificata su tsinghua.edu.cn
- Chun GuoShandong UniversityEmail verificata su sdu.edu.cn