Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Thomas JohanssonDept of EIT, Lund University, SwedenEmail verificata su eit.lth.se
- Willi MeierFHNWEmail verificata su fhnw.ch
- Jonathan SönnerupPhD student in computer security, Lund UniversityEmail verificata su eit.lth.se
- Paul Stankovski WagnerAssociate Professor, Lund UniversityEmail verificata su eit.lth.se
- Pegah Nikbakht BidehPh.D student, Lund universityEmail verificata su eit.lth.se
- Linus KarlssonPhD Student, Computer SecurityEmail verificata su eit.lth.se
- Hirotaka YoshidaAISTEmail verificata su aist.go.jp
- Martin HöstMalmö UniversityEmail verificata su mau.se
- Subhamoy MaitraIndian Statistical InstituteEmail verificata su isical.ac.in
- Elena DubrovaRoyal Institute of Technology (KTH), Stockholm, SwedenEmail verificata su kth.se
- Sushmita RujSenior Lecturer, UNSW, SydneyEmail verificata su unsw.edu.au
- Guang GongProfessor, Dept. ECE, University of WaterlooEmail verificata su uwaterloo.ca
- Kishan Chand GuptaProfessor, Indian Statistical InstituteEmail verificata su isical.ac.in
- Yassir NawazStrategic Technology & Innovation Center, Pitney Bowes Inc.Email verificata su pb.com
- Thomas OlssonRobert Bosch ABEmail verificata su se.bosch.com
- Carl LöndahlCryptography, biometryEmail verificata su eit.lth.se
- Nicolae PaladiLund University and CanaryBitEmail verificata su eit.lth.se
- Joakim Brorssonphd student, Lund UniversityEmail verificata su eit.lth.se