Crea il mio profilo
Accesso pubblico
Visualizza tutto22 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Colin BoydNorwegian University of Science and TechnologyEmail verificata su item.ntnu.no
- Gareth T. DaviesNXP SemiconductorsEmail verificata su nxp.com
- Cas CremersCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Tibor JagerUniversity of WuppertalEmail verificata su uni-wuppertal.de
- Christopher CarrUniversity of Exeter, UKEmail verificata su exeter.ac.uk
- S. F. MjølsnesProfessor at NTNUEmail verificata su item.ntnu.no
- Peter Browne RønneResearcherEmail verificata su nbi.dk
- Mohsen TooraniAssociate Professor, University of South-Eastern Norway (USN)Email verificata su usn.no
- Peter RyanProfessor of applied security, university of luxembourgEmail verificata su uni.lu
- Katriel Cohn-GordonMetaEmail verificata su katriel.co.uk
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgEmail verificata su uni.lu
- Rene PeraltaNISTEmail verificata su nist.gov
- James AspnesYale UniversityEmail verificata su yale.edu
- Håvard RaddumSimula Research LaboratoryEmail verificata su simula.no
- Clementine GrittiLecturer, University of CanterburyEmail verificata su canterbury.ac.nz
- Anamaria CostacheNorwegian University of Science and TechnologyEmail verificata su ntnu.no