Crea il mio profilo
Accesso pubblico
Visualizza tutto23 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Email verificata su irit.fr
Alessandro ArmandoUniversity of GenovaEmail verificata su unige.it
Michael RusinowitchINRIAEmail verificata su loria.fr
Thomas GroßProfessor of System Security, Newcastle UniversityEmail verificata su ncl.ac.uk
Achim D. BruckerUniversity of Exeter, Exeter, UKEmail verificata su exeter.ac.uk
Jan CamenischDFINITYEmail verificata su dfinity.org
Olga KouchnarenkoFEMTO-ST and UFC/UBFCEmail verificata su univ-fcomte.fr
Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceEmail verificata su femto-st.fr
Sören BleikertzResearcher, IBM Research - ZurichEmail verificata su zurich.ibm.com
Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeEmail verificata su tees.ac.uk
Omar AlmousaJordan University of Science and TechnologyEmail verificata su just.edu.jo
Gregory NevenChainlink LabsEmail verificata su smartcontract.com
Alessandro BruniAssociate Professor. IT-University of CopenhagenEmail verificata su itu.dk
Marius MineaAssociate Professor, Politehnica University of TimisoaraEmail verificata su cs.upt.ro
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyEmail verificata su fbk.eu
Serena Elisa PontaSAP Security ResearchEmail verificata su sap.com
Hanne Riis Nielsonprofessor at DTU Applied Mathematics and Computer ScienceEmail verificata su imm.dtu.dk
Flemming NielsonProfessor at DTU Applied Mathematics and Computer ScienceEmail verificata su imm.dtu.dk