Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Aleksandr OmetovTampere University, Senior Research FellowEmail verificata su tuni.fi
- Natalia VoloshinaITMO UniversityEmail verificata su itmo.ru
- Sergey AndreevTampere University, FinlandEmail verificata su tuni.fi
- Jarmo HarjuTietoliikennetekniikan emeritusprofessori, Tampereen teknillinen yliopistoEmail verificata su tut.fi
- Antonia Wachter-ZehAssociate Professor at Technical University of Munich (TUM)Email verificata su tum.de
- Mohammed Zaki AhmedPlymouth UniversityEmail verificata su plymouth.ac.uk
- Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUEmail verificata su item.ntnu.no
- Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andEmail verificata su finki.ukim.mk
- Mubarak JibrilUniversity of plymouthEmail verificata su plymouth.ac.uk
- Roman FloreaGoogleEmail verificata su google.com
- Markus GrasslInternational Centre for Theory of Quantum Technologies (ICTQT) , University GdanskEmail verificata su ug.edu.pl
- Maximilien GadouleauAssociate Professor in Computer Science, Durham UniversityEmail verificata su durham.ac.uk
- Jiri HosekBrno University of TechnologyEmail verificata su feec.vutbr.cz
- Alla LevinaITMO UniversityEmail verificata su cit.ifmo.ru
- Komosny DanBrno University of TechnologyEmail verificata su vut.cz
- Kathiravelu GaneshanSenior Lecturer, Otago Polytechnic, Auckland International CampusEmail verificata su edenz.ac.nz
- Miroslav VoznakTechnical University of OstravaEmail verificata su vsb.cz
- Sergey AndreevNRC Institute of Immunology, MoscowEmail verificata su immune.umos.ru
- Yevgeni KoucheryavyTampere University of Technology
Segui
Bezzateev Sergey
Saint Petersburg State University of Aerospace Instrumentation, Department of Information Security
Email verificata su aanet.ru