Crea il mio profilo
Accesso pubblico
Visualizza tutto24 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Steve KremerInriaEmail verificata su inria.fr
- Bruno BlanchetSenior researcher, INRIA ParisEmail verificata su inria.fr
- Stéphanie DelauneUniv Rennes, CNRS, IRISAEmail verificata su irisa.fr
- Véronique CortierCNRS, LORIAEmail verificata su loria.fr
- Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su cs.bham.ac.uk
- Hubert Comon-LundhComputer Science professor, ENS CachanEmail verificata su lsv.ens-cachan.fr
- Jiangshan Yu (于江山)Associate Professor, University of SydneyEmail verificata su sydney.edu.au
- Myrto ArapinisSchool of Informatics, University of EdinburghEmail verificata su inf.ed.ac.uk
- Stefan CiobacaAlexandru Ioan Cuza UniversityEmail verificata su info.uaic.ro
- Rohit ChadhaUniversity of MissouriEmail verificata su missouri.edu
- Charlie JacommeUniversité de Lorraine, LORIA, Inria Nancy Grand-EstEmail verificata su inria.fr
- Kushal BabelPhD Student, Cornell UniversityEmail verificata su cornell.edu
- Karthikeyan BhargavanINRIAEmail verificata su inria.fr
- Christopher A. WoodRIT, UCI, Cloudflare, AppleEmail verificata su heapingbits.net
- Bogdan WarinschiUniversity of Bristol and DfinityEmail verificata su cs.bris.ac.uk
- Lucca HirschiTenured Inria Researcher @ LoriaEmail verificata su inria.fr
- Alexander DaxPhD Student, Saarland University, CISPA Helmholtz Center for Information SecurityEmail verificata su stud.uni-saarland.de
- Cas CremersCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de