Crea il mio profilo
Accesso pubblico
Visualizza tutto13 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jens GrothChief Scientist, NexusEmail verificata su ucl.ac.uk
- Jonathan BootleResearcher at IBM Research - ZurichEmail verificata su zurich.ibm.com
- Andrea CerulliDFINITYEmail verificata su dfinity.org
- Nigel SmartKU LeuvenEmail verificata su kuleuven.be
- Bogdan WarinschiUniversity of Bristol and DfinityEmail verificata su cs.bris.ac.uk
- Georg FuchsbauerTU WienEmail verificata su ist.ac.at
- Andrew McCarthyPost Graduate Researcher, University of the West of EnglandEmail verificata su uwe.ac.uk
- Phil LeggProfessor in Cyber Security, University of the West of EnglandEmail verificata su uwe.ac.uk
- Panagiotis AndriotisUniversity of BirminghamEmail verificata su bham.ac.uk
- Christophe PetitUniversité libre de Bruxelles - University of BirminghamEmail verificata su ulb.be
- Mohammad HajiabadiAssistant Professor, David R. Cheriton School of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- James DavenportHebron & Medlock Professor of Information Technology, University of Bath; former Vice-President, BCSEmail verificata su bath.ac.uk
- Liqun ChenProfessor, University of Surrey, UKEmail verificata su surrey.ac.uk
- Stephan KrennAIT Austrian Institute of Technology GmbHEmail verificata su ait.ac.at
- Hanen Boussi RahmouniUniversity of Tunis el ManarEmail verificata su istmt.utm.tn
- Marco Casassa MontPrincipal Cyber Security Consultant & ManagerEmail verificata su bmtglobal.com
- Sabri BarbariaLRBTMEmail verificata su istmt.utm.tn
- Santeri PaavolainenAalto UniversityEmail verificata su aalto.fi
- Christopher CarrUniversity of Exeter, UKEmail verificata su exeter.ac.uk