Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sven LaurAssociate Professor in Privacy-Preserving Data Mining, University of TartuEmail verificata su ut.ee
- Janno SiimSimula UiBEmail verificata su simula.no
- Michal ZajacNethermindEmail verificata su nethermind.io
- Aggelos KiayiasSchool of Informatics, University of Edinburgh, & IOGEmail verificata su ed.ac.uk
- Bingsheng ZhangZhejiang University, IOHKEmail verificata su zju.edu.cn
- Taneli MielikäinenYahoo!Email verificata su yahoo-inc.com
- Prastudy FauziResearch Fellow at NTU, SingaporeEmail verificata su ntu.edu.sg
- Peeter LaudCybernetica ASEmail verificata su cyber.ee
- Behzad AbdolmalekiUniversity of Sheffield, United KingdomEmail verificata su sheffield.ac.uk
- Kateryna Pavlykresearcher, University of TartuEmail verificata su ut.ee
- David WagnerProfessor of Computer Science, UC BerkeleyEmail verificata su cs.berkeley.edu
- Phillip RogawayUC DavisEmail verificata su cs.ucdavis.edu
- Bart GoethalsProfessor of Computer Science, University of AntwerpEmail verificata su uantwerpen.be
- Edith ElkindUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Valtteri NiemiTietojenkäsittelytieteen professori, Helsingin yliopistoEmail verificata su helsinki.fi
- Jan WillemsonSenior researcher, CyberneticaEmail verificata su cyber.ee
- Qiang TangThe University of SydneyEmail verificata su sydney.edu.au
- Nikos LeonardosUniversity of AthensEmail verificata su di.uoa.gr
- Rafik Chaabouni, PhDCyber Security and CryptographyEmail verificata su chaabouni.ch
- N. AsokanProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca