Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Bernd FinkbeinerProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Christopher HahnX, the moonshot factory (Google X)Email verificata su google.com
- Norine CoenenCISPA Helmholtz Center for Information SecurityEmail verificata su react.uni-saarland.de
- Leander TentrupSaarland University, Saarland Informatics CampusEmail verificata su cs.uni-saarland.de
- Juha KontinenProfessor, University of Helsinki, FinlandEmail verificata su helsinki.fi
- Jonni VirtemaLecturer, University of Sheffield, UKEmail verificata su sheffield.ac.uk
- Fan YangUtrecht UniversityEmail verificata su uu.nl
- David CarralInria, LIRMM, University of Montpellier, CNRSEmail verificata su inria.fr
- Markus KrötzschTechnische Universität DresdenEmail verificata su tu-dresden.de
- Raven BeutnerCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Boris KöpfAzure Research, MicrosoftEmail verificata su microsoft.com
- Cédric FournetMicrosoft ResearchEmail verificata su microsoft.com
- Oleksii OleksenkoSenior Researcher, Azure ResearchEmail verificata su microsoft.com
- Noemi PassingCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Florian KohnPhd Student, CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Hadar FrenkelCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de