Crea il mio profilo
Accesso pubblico
Visualizza tutto17 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Erkay SavasSabanci UniversityEmail verificata su sabanciuniv.edu
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Nazar Abbas SaqibImam Abdulrahman Bin Faisal University, 2835 King Faisal Road, Dammam 34212Email verificata su iau.edu.sa
- Berk SunarWorcester Polytechnic InstituteEmail verificata su wpi.edu
- Onur AciicmezSamsung Research AmericaEmail verificata su samsung.com
- Francisco Rodríguez-HenríquezTechnology Innovation Center: Cryptography Research Centre of the Technology Innovation CentreEmail verificata su cs.cinvestav.mx
- Tolga AcarMicrosoftEmail verificata su microsoft.com
- Burt Kaliski Jr.VerisignEmail verificata su alum.mit.edu
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsEmail verificata su tu-berlin.de
- Ray C.C. CheungAssociate Provost (Digital Learning), Professor of Computer Engineering, City University of HongEmail verificata su cityu.edu.hk
- Tugrul YanikResearch ScientistEmail verificata su lifetime.oregonstate.edu
- Guanrong ChenCity University of Hong KongEmail verificata su cityu.edu.hk
- Lo'ai TawalbehProf. of Computing and Cyber SecurityEmail verificata su synopsys.com
- Murat AydosHacettepe ÜniversitesiEmail verificata su hacettepe.edu.tr
- Serdar S. ErdemGebze technical University, Kocaeli, TurkeyEmail verificata su gtu.edu.tr
- Donglong ChenAssociate Professor, BNU-HKBU United International College (UIC)Email verificata su uic.edu.cn
- Albert LeviSabancı ÜniversitesiEmail verificata su sabanciuniv.edu
- Efstratios GallopoulosComputer Engineering and Informatics Department (CEID), University of Patras, GreeceEmail verificata su ceid.upatras.gr
- Gokay SaldamliSan Jose State UniversityEmail verificata su sjsu.edu
- Zeynep Ödemiş Özgerİzmir Katip Çelebi UniversityEmail verificata su ikc.edu.tr