Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyEmail verificata su tu-darmstadt.de
- Daniele VenturiFull Professor, Sapienza University of Rome, ItalyEmail verificata su di.uniroma1.it
- Christian SchaffnerUniversity of Amsterdam & QuSoftEmail verificata su uva.nl
- Anja LehmannHasso Plattner Institute, University of PotsdamEmail verificata su hpi.de
- Jintai DingTHUEmail verificata su uc.edu
- Artur MarianoUniversity of MinhoEmail verificata su di.uminho.pt
- Dan BonehProfessor of Computer Science, Stanford UniversityEmail verificata su cs.stanford.edu
- Sebastian GajekProfessor of Information Security and Cryptography, Flensburg University of Applied SciencesEmail verificata su hs-flensburg.de
- Bo-Yin YangAcademia SinicaEmail verificata su moscito.org
- Pierre-Louis CayrelAss. Professor - Université Jean Monnet - Saint-EtienneEmail verificata su univ-st-etienne.fr
- Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergEmail verificata su fau.de
- Erdem ALKIMDokuz Eylul University, Izmir, TurkeyEmail verificata su deu.edu.tr
- Nina BindelSenior Researcher at SandboxAQEmail verificata su sandboxquantum.com
- Peter SchwabeMPI-SP and Radboud UniversityEmail verificata su mpi-sp.org
- David GalindoCTO, Valory AGEmail verificata su valory.xyz
- Pascal Véronmaître de conférences, Université de ToulonEmail verificata su univ-tln.fr
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenEmail verificata su unibw.de
- Andreas PeterProfessor, Safety-Security-Interaction Group, Carl von Ossietzky Universität Oldenburg, GermanyEmail verificata su uol.de
- Bertram PoetteringIBM Research Labs - ZurichEmail verificata su zurich.ibm.com
- Giuseppe AtenieseGeorge Mason UniversityEmail verificata su gmu.edu