Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaEmail verificata su alari.ch
- Ciara RaffertyQueen's University BelfastEmail verificata su qub.ac.uk
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeEmail verificata su ntu.edu.sg
- Shivam BhasinNTU SingaporeEmail verificata su ntu.edu.sg
- Mahabir Prasad JhanwarAssociate Professor, Ashoka UniversityEmail verificata su ashoka.edu.in
- Carlos Aguilar-MelchorChief Scientist, Cybersecurity, SandboxAQEmail verificata su sandboxquantum.com
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamEmail verificata su aau.at
- Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumEmail verificata su rub.de
- Andreas HülsingAssociate Professor, Eindhoven University of TechnologyEmail verificata su tue.nl
- David JosephResearch Scientist, SandboxAQEmail verificata su sandboxaq.com
- Thomas PrestPQShieldEmail verificata su pqshield.com
- Dongze YueSandbox AQEmail verificata su sandboxaq.com
- Markus KrauszRuhr-University BochumEmail verificata su rub.de
- Daniel AponUniversity of MarylandEmail verificata su cs.umd.edu
- Weiqiang LiuProfessor, Nanjing University of Aeronautics and AstronauticsEmail verificata su nuaa.edu.cn
- Mélissa RossiANSSIEmail verificata su ssi.gouv.fr
- Thomas RicossetThalesEmail verificata su thalesgroup.com
- Nicolas GamaChief Computer Scientist, Inpher and AP, Cryptologie, Université de VersaillesEmail verificata su uvsq.fr
- Sarah McCarthyResearch Assistant, Centre for Secure Information Technologies, Queen's University BelfastEmail verificata su qub.ac.uk