Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su cs.bham.ac.uk
- Vincent ChevalUniversity of Oxford, United KingdomEmail verificata su cs.ox.ac.uk
- Bruno BlanchetSenior researcher, INRIA, ParisEmail verificata su inria.fr
- Elizabeth QuagliaReader, Royal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Steve KremerInriaEmail verificata su inria.fr
- Véronique CortierCNRS, LORIAEmail verificata su loria.fr
- Liqun ChenProfessor, University of Surrey, UKEmail verificata su surrey.ac.uk
- Stéphanie DelauneUniv Rennes, CNRS, IRISAEmail verificata su irisa.fr
- Michael ClarksonProvost's Teaching Fellow and Senior Lecturer of Computer Science, Cornell UniversityEmail verificata su cornell.edu
- Peter RyanProfessor of applied security, university of luxembourgEmail verificata su uni.lu
- Steven FrinkPh.D. student, Cornell UniversityEmail verificata su cs.cornell.edu
- Tom ChothiaUniversity of BirminghamEmail verificata su cs.bham.ac.uk
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickEmail verificata su warwick.ac.uk
- Bogdan WarinschiUniversity of Bristol and DfinityEmail verificata su cs.bris.ac.uk
- Olivier PereiraUCLouvainEmail verificata su uclouvain.be
- Yuichi KomanoChiba Institute of TechnologyEmail verificata su ruri.waseda.jp
- Joeri de RuiterSpecialist security and privacy at SURFEmail verificata su surf.nl
- Georgios PaschosDirector, Research Science, AmazonEmail verificata su amazon.lu
- Jérémie LeguayHuawei TechnologiesEmail verificata su huawei.com
- Thomas HainesAustralian National UniversityEmail verificata su anu.edu.au