Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mats NäslundKTH, Royal Institute of TechnologyEmail verificata su kth.se
- Ludwig SeitzCombitech ABEmail verificata su combitech.se
- John Preuß MattssonExpert in Cryptographic Algorithms and Security Protocols, Ericsson ResearchEmail verificata su ericsson.com
- Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenEmail verificata su kth.se
- rolf j blomRISE Research Instirutes of SwedenEmail verificata su ri.se
- Shahid RazaDirector of Cybersecurity Unit @ RISE Sweden | Professor of Cybersecurity, Mälardalen Uni. SwedenEmail verificata su ri.se
- Christian GehrmannLund UniversityEmail verificata su eit.lth.se
- Mališa Vučinić Research Scientist, InriaEmail verificata su inria.fr
- Marco TilocaRISE Research Institutes of SwedenEmail verificata su ri.se
- Lilian BossuetProfessor, University of Lyon, Saint-Etienne - Laboratoire Hubert Curien - CNRSEmail verificata su univ-st-etienne.fr
- Ravishankar BorgaonkarResearch Fellow, University of OxfordEmail verificata su cs.ox.ac.uk
- Sandeep KumarAssistant Professor at Panipat Institute of Engineering & Technology, SamalkhaEmail verificata su piet.co.in
- Jari ArkkoEricssonEmail verificata su ericsson.com
- Joachim SachsSenior Expert, EricssonEmail verificata su ericsson.com
- Teemu Rinta-ahoCimcorpEmail verificata su rinta-aho.org
- Thomas WatteyneInria, FranceEmail verificata su eecs.berkeley.edu
- Karl NorrmanSecurity Researcher, Ericsson Research and KTH Royal Instintute of TechnologyEmail verificata su ericsson.com