Crea il mio profilo
Accesso pubblico
Visualizza tutto31 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Stéphanie DelauneUniv Rennes, CNRS, IRISAEmail verificata su irisa.fr
- Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su cs.bham.ac.uk
- Olivier MarkowitchUniversité Libre de Bruxelles, BelgiumEmail verificata su ulb.be
- Véronique CortierCNRS, LORIAEmail verificata su loria.fr
- Vincent ChevalUniversity of Oxford, United KingdomEmail verificata su cs.ox.ac.uk
- Graham SteelINRIAEmail verificata su cryptosense.com
- Jean-François RaskinUniversité Libre de Bruxelles, U.L.B.Email verificata su ulb.ac.be
- Bogdan WarinschiUniversity of Bristol and DfinityEmail verificata su cs.bris.ac.uk
- Rohit ChadhaUniversity of MissouriEmail verificata su missouri.edu
- Ben SmythFounder-CEO, x26.ioEmail verificata su bensmyth.com
- Stefan CiobacaAlexandru Ioan Cuza UniversityEmail verificata su info.uaic.ro
- Myrto ArapinisSchool of Informatics, University of EdinburghEmail verificata su inf.ed.ac.uk
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg
- Matteo MaffeiFull Professor at TU WienEmail verificata su tuwien.ac.at
- Laurent MazareEmail verificata su polytechnique.org
- Jannik DreierLORIA, Université de Lorraine, TELECOM NancyEmail verificata su loria.fr
- Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaEmail verificata su math.upenn.edu
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityEmail verificata su cispa.saarland
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichEmail verificata su inf.ethz.ch
- Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Email verificata su ens.fr