Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
- David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Email verificata su irit.fr
- Alessandro ArmandoUniversity of GenovaEmail verificata su unige.it
- Michael RusinowitchINRIAEmail verificata su loria.fr
- Thomas GroßProfessor of System Security, Newcastle UniversityEmail verificata su ncl.ac.uk
- Jan CamenischDFINITYEmail verificata su dfinity.org
- Olga KouchnarenkoFEMTO-ST and UFC/UBFCEmail verificata su univ-fcomte.fr
- Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceEmail verificata su femto-st.fr
- Achim D. BruckerUniversity of Exeter, Exeter, UKEmail verificata su exeter.ac.uk
- Sören BleikertzResearcher, IBM Research - ZurichEmail verificata su zurich.ibm.com
- Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeEmail verificata su tees.ac.uk
- Omar AlmousaJordan University of Science and TechnologyEmail verificata su just.edu.jo
- Gregory NevenChainlink LabsEmail verificata su smartcontract.com
- Alessandro BruniAssociate Professor. IT-University of CopenhagenEmail verificata su itu.dk
- Marius MineaAssociate Professor, Politehnica University of TimisoaraEmail verificata su cs.upt.ro
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyEmail verificata su fbk.eu
- Serena Elisa PontaSAP Security ResearchEmail verificata su sap.com
- Hanne Riis Nielsonprofessor at DTU Applied Mathematics and Computer ScienceEmail verificata su imm.dtu.dk
- Flemming NielsonProfessor at DTU Applied Mathematics and Computer ScienceEmail verificata su imm.dtu.dk