Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauEmail verificata su uni-passau.de
- Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Gregor LeanderRuhr University BochumEmail verificata su rub.de
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Anne CanteautInria Paris-Rocquencourt, FranceEmail verificata su inria.fr
- Miroslav KnezevicNXP SemiconductorsEmail verificata su nxp.com
- Lars Ramkilde KnudsenSDUEmail verificata su ramkildeknudsen.dk
- Andrey BogdanovCEO/Founder at CYBERCRYPTEmail verificata su cyber-crypt.com
- Martin R. AlbrechtKing's College LondonEmail verificata su kcl.ac.uk
- Martin M. LauridsenTechnical University of DenmarkEmail verificata su dtu.dk
- Barış EgeRiscure B.V.Email verificata su riscure.com
- Nele MentensLeiden University and KU LeuvenEmail verificata su esat.kuleuven.be
- Neslin IsmailogluTÜBİTAK UZAYEmail verificata su tubitak.gov.tr
- Hristina MihajloskaSs. Cyril and Methodius University, Faculty of Computer Science and EngineeringEmail verificata su finki.ukim.mk
- Giovanni BoeroEcole Polytechnique Federale de LausanneEmail verificata su epfl.ch
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Ingrid VerbauwhedeKU LeuvenEmail verificata su esat.kuleuven.be
- Amitabh DasAMD. Austin, Texas, USA & Intel Corporation, Hillsboro, Oregon, USA & COSIC/ESAT, KU Leuven, BelgiumEmail verificata su amd.com
- Elmar TischhauserUniversity of MarburgEmail verificata su mathematik.uni-marburg.de