Crea il mio profilo
Accesso pubblico
Visualizza tutto13 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Pascal LafourcadeUniversité Clermont AuvergneEmail verificata su uca.fr
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Lucca HirschiTenured Inria Researcher @ LoriaEmail verificata su inria.fr
- Sasa RadomirovicUniversity of SurreyEmail verificata su surrey.ac.uk
- Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble Alpes, Laboratoire Jean KuntzmannEmail verificata su imag.fr
- Xavier BultelINSA Centre-Val de LoireEmail verificata su insa-cvl.fr
- Ali KassemR&D at Ecole PolytechniqueEmail verificata su polytechnique.edu
- Hugo JonkerOpen UniversiteitEmail verificata su ou.nl
- Cas CremersCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgEmail verificata su uni.lu
- Rosario GiustolisiIT University of CopenhagenEmail verificata su itu.dk
- Steve KremerInriaEmail verificata su inria.fr
- Florian KerschbaumUniversity of WaterlooEmail verificata su uwaterloo.ca
- Véronique CortierCNRS, LORIAEmail verificata su loria.fr
- Peter RyanProfessor of applied security, university of luxembourgEmail verificata su uni.lu
- Atsuki NagaoLecturer, Ochanomizu UniversityEmail verificata su is.ocha.ac.jp
- Daiki MiyaharaThe University of Electro-CommunicationsEmail verificata su uec.ac.jp
- Takaaki MizukiTohoku UniversityEmail verificata su cc.tohoku.ac.jp
- Maxime PuysUniv. Clermont AuvergneEmail verificata su uca.fr
Segui