Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Email verificata su irit.fr
Alessandro ArmandoUniversity of GenovaEmail verificata su unige.it
David BasinProfessor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeEmail verificata su kcl.ac.uk
Jieh HsiangNational Taiwan UniversityEmail verificata su ntu.edu.tw
Pascal MolliUniversity of NantesEmail verificata su univ-nantes.fr
Gérald OsterAssistant Professor, Université de Lorraine, TELECOM Nancy, InriaEmail verificata su loria.fr
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityEmail verificata su imm.dtu.dk
Gregory KucherovDirecteur de recherche CNRS, LIGM, Université Gustave Eiffel, FranceEmail verificata su univ-mlv.fr
Olga KouchnarenkoFEMTO-ST and UFC/UBFCEmail verificata su univ-fcomte.fr
Silvio RaniseFBKEmail verificata su fbk.eu
Véronique CortierCNRS, LORIAEmail verificata su loria.fr
Rakesh Verma, Rakesh M. Verma, RM...Professor of Computer Science, University of HoustonEmail verificata su uh.edu
Eugen ZalinescuNomadic LabsEmail verificata su nomadic-labs.com
Robert NieuwenhuisProfessor of Computer Science, Tech. Univ. Catalonia (UPC), BarcelonaEmail verificata su cs.upc.edu
Marius MineaAssociate Professor, Politehnica University of TimisoaraEmail verificata su cs.upt.ro
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyEmail verificata su fbk.eu
Serena Elisa PontaSAP Security ResearchEmail verificata su sap.com
Aditya SehgalParity Computing Inc.Email verificata su acm.org