Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- N. AsokanProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Andrew MartinProfessor of Systems Security, University of OxfordEmail verificata su cs.ox.ac.uk
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatEmail verificata su ics.uci.edu
- Ian BrownResearch ICT AfricaEmail verificata su researchictafrica.net
- Santiago Zanella-BéguelinMicrosoft ResearchEmail verificata su microsoft.com
- Boris KöpfAzure Research, MicrosoftEmail verificata su microsoft.com
- Thomas NymanL M EricssonEmail verificata su ericsson.com
- Shruti TopleAzure Research, MicrosoftEmail verificata su microsoft.com
- Lucas Vincenzo DaviUniversity of Duisburg-EssenEmail verificata su uni-due.de
- Arseny KurnikovPhD student, Aalto UniversityEmail verificata su aalto.fi
- Lukas WutschitzMicrosoftEmail verificata su microsoft.com
- Jan-Erik EkbergHead of Mobile Security, Huawei FinlandEmail verificata su huawei.com
- Victor RuehleMicrosoftEmail verificata su microsoft.com
- Ghada DessoukyTU Darmstadt | GoogleEmail verificata su trust.tu-darmstadt.de
- Jian LiuProfessor at Zhejiang UniversityEmail verificata su zju.edu.cn
- Mohammad MannanProfessor, CIISE, Concordia University, CanadaEmail verificata su ciise.concordia.ca
- Yoshimichi NakatsukaUniversity of California, IrvineEmail verificata su uci.edu
- Andrew SimpsonUniversity Lecturer in Software Engineering, Department of Computer Science, University of OxfordEmail verificata su cs.ox.ac.uk
- Robin AnkeleUniversity of OxfordEmail verificata su cs.ox.ac.uk