Crea il mio profilo
Accesso pubblico
Visualizza tutto16 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stefan MangardGraz University of TechnologyEmail verificata su tugraz.at
- Florian MendelCryptographer & Security Architect - Infineon TechnologiesEmail verificata su infineon.com
- Maria EichlsederGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Christoph DobraunigIntel CorporationEmail verificata su intel.com
- Barbara GigerlGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Bart MenninkDigital Security Group, Radboud University, NijmegenEmail verificata su cs.ru.nl
- Peter PesslInfineon TechnologiesEmail verificata su infineon.com
- Thomas UnterluggauerResearch Scientist, Intel CorporationEmail verificata su intel.com
- Roderick BloemGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Vedad HadžićPhD Student, TU GrazEmail verificata su iaik.tugraz.at
- Hannes GrossGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Joan DaemenProfessor, Radboud UniversityEmail verificata su noekeon.org
- Matthias J. KannwischerQuantum Safe Migration Center, Chelpis Quantum TechEmail verificata su chelpis.com
- Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andEmail verificata su finki.ukim.mk
- Christine van VredendaalNXP SemiconductorsEmail verificata su nxp.com
- Julius HermelinkMax Planck Institute for Security and Privacy (MPI-SP)Email verificata su mpi-sp.org
- Thomas SchambergerChair of Security in Information Technology, Technical University of MunichEmail verificata su tum.de
- Rishub NagpalGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Marcel NagelerGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Sara ZareiSharif University of TechnologyEmail verificata su ee.sharif.ir