Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
4 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jan CamenischDFINITYEmail verificata su dfinity.org
- Patrik BichselPrivacy Researcher, IBM Research - Zurich Email verificata su zurich.ibm.com
- Sören BleikertzResearcher, IBM Research - ZurichEmail verificata su zurich.ibm.com
- Günter KarjothLucerne University of Applied SciencesEmail verificata su acm.org
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityEmail verificata su imm.dtu.dk
- Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUEmail verificata su shoup.net
- Charles MorissetReader in Security, Newcastle UniversityEmail verificata su ncl.ac.uk
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKEmail verificata su bham.ac.uk
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Ioannis SfyrakisLecturer in Computer Science, Teesside UniversityEmail verificata su tees.ac.uk
- Syh Yuan TanNewcastle UniversityEmail verificata su newcastle.ac.uk
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Budi AriefUniversity of KentEmail verificata su kent.ac.uk
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
- Luke O'ConnorSecurity Consultant
Segui
Thomas Groß
Professor of System Security, Newcastle University
Email verificata su ncl.ac.uk - Home page