Crea il mio profilo
Accesso pubblico
Visualizza tutto52 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Daniel GenkinGeorgia TechEmail verificata su gatech.edu
- Daniel GrussGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Michael SchwarzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Moritz LippEmail verificata su mlq.me
- Stefan MangardGraz University of TechnologyEmail verificata su tugraz.at
- Gernot HeiserProfessor of Computer Science, University of New South WalesEmail verificata su unsw.edu.au
- Qian GeGoogleEmail verificata su google.com
- Jann HornGoogle Project ZeroEmail verificata su google.com
- Marina MinkinUniversity of MichiganEmail verificata su umich.edu
- Katrina FalknerProfessor, School of Computer Science, University of AdelaideEmail verificata su adelaide.edu.au
- Jo Van Bulckimec-DistriNet, KU LeuvenEmail verificata su cs.kuleuven.be
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Raoul StrackxFortanixEmail verificata su fortanix.com
- Fangfei LiuIntel CorporationEmail verificata su intel.com
- Baris KasikciUniversity of WashingtonEmail verificata su cs.washington.edu
- Daniel MoghimiSenior Research Scientist, GoogleEmail verificata su google.com
- Chitchanok ChuengsatiansupThe University of MelbourneEmail verificata su unimelb.edu.au
- Andrew KwongUNC Chapel HillEmail verificata su cs.unc.edu
- Ruby B. LeeForrest G. Hamrick Professor of Electrical Engineering, also Computer ScienceEmail verificata su princeton.edu
- Sioli O'ConnellThe University of AdelaideEmail verificata su adelaide.edu.au