Crea il mio profilo
Accesso pubblico
Visualizza tutto19 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Peter SchwabeMPI-SP and Radboud UniversityEmail verificata su mpi-sp.org
- Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsEmail verificata su cwi.nl
- Vadim LyubashevskyIBM Research Europe, ZurichEmail verificata su zurich.ibm.com
- Ingo von MaurichNXP SemiconductorsEmail verificata su rub.de
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Stefan NürnbergerELEXIR AGEmail verificata su elexir.eu
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtEmail verificata su encrypto.cs.tu-darmstadt.de
- Sven BugielCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Zheng GongProfessor of Computer Science, South China Normal UniversityEmail verificata su scnu.edu.cn
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainEmail verificata su uclouvain.be
- Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumEmail verificata su uclouvain.be
- Marcel WinandySenior Expert Cyber Security Architect at E.ONEmail verificata su eon.com