Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Email verificata su irit.fr
- Alessandro ArmandoUniversity of GenovaEmail verificata su unige.it
- David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Jieh HsiangNational Taiwan UniversityEmail verificata su ntu.edu.tw
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
- Pascal MolliUniversity of NantesEmail verificata su univ-nantes.fr
- Gérald OsterAssistant Professor, Université de Lorraine, TELECOM Nancy, InriaEmail verificata su loria.fr
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityEmail verificata su imm.dtu.dk
- Gregory KucherovDirecteur de recherche CNRS, LIGM, Univ Gaspard Monge, FranceEmail verificata su univ-mlv.fr
- Olga KouchnarenkoFEMTO-ST and UFC/UBFCEmail verificata su univ-fcomte.fr
- Silvio RaniseFBKEmail verificata su fbk.eu
- Véronique CortierCNRS, LORIAEmail verificata su loria.fr
- Rakesh Verma, Rakesh M. Verma, RM...Professor of Computer Science, University of HoustonEmail verificata su uh.edu
- Eugen ZalinescuNomadic LabsEmail verificata su nomadic-labs.com
- Robert NieuwenhuisProfessor of Computer Science, Tech. Univ. Catalonia (UPC), BarcelonaEmail verificata su cs.upc.edu
- Marius MineaAssociate Professor, Politehnica University of TimisoaraEmail verificata su cs.upt.ro
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyEmail verificata su fbk.eu
- Serena Elisa PontaSAP Security ResearchEmail verificata su sap.com
- Aditya SehgalParity Computing Inc.Email verificata su acm.org