Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Serge VaudenayProfessor at EPFLEmail verificata su epfl.ch
- Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenEmail verificata su unisg.ch
- Alessio R LomuscioImperial College LondonEmail verificata su imperial.ac.uk
- David GERAULTTIIEmail verificata su tii.ae
- Pascal LafourcadeUniversité Clermont AuvergneEmail verificata su uca.fr
- Gildas AvoineINSA Rennes, IRISA, CNRSEmail verificata su irisa.fr
- Tom ChothiaUniversity of BirminghamEmail verificata su cs.bham.ac.uk
- Muhammed Ali BingolSenior Lecturer in Cyber Security at De Montfort UniversityEmail verificata su dmu.ac.uk
- Liqun ChenProfessor, University of Surrey, UKEmail verificata su surrey.ac.uk
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Rolando Trujillo RasúaRamon i Cajal ResearcherEmail verificata su urv.cat
- Chong Hee KIMPrincipal SoC Security Assessor at NXPEmail verificata su nxp.com
- Süleyman KardaşAssist. Prof. at Batman UniversityEmail verificata su batman.edu.tr
- Dave SingeleeKatholieke Universiteit Leuven - COSICEmail verificata su esat.kuleuven.be
- Jorge MunillaProfessor of Telecommunication Engineering, University of MalagaEmail verificata su ic.uma.es
- Kasper RasmussenUniversity of OxfordEmail verificata su cs.ox.ac.uk
- Karthikeyan BhargavanINRIAEmail verificata su inria.fr
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceEmail verificata su ens.fr
- Asli BAYAntalya Bilim UniversitesiEmail verificata su antalya.edu.tr
- Andrew V. JonesVector Software, Inc.Email verificata su vectorcast.com