Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Martin R. AlbrechtKing's College LondonEmail verificata su kcl.ac.uk
- Matthew RobshawTechnical Fellow, Impinj Inc.Email verificata su impinj.com
- Ludovic PerretSorbonne University/LIP6Email verificata su lip6.fr
- Thomas JohanssonDept of EIT, Lund University, SwedenEmail verificata su eit.lth.se
- Shinsaku KiyomotoKDDI Research Inc.Email verificata su kddi-research.jp
- Arman (MHR) KhouzaniSenior Lecturer, Victoria University of WellingtonEmail verificata su vuw.ac.nz
- Simon R. BlackburnRoyal Holloway University of LondonEmail verificata su rhul.ac.uk
- Christian JansonResearch Group Leader, Technische Universität Darmstadt (TU Darmstadt), GermanyEmail verificata su tu-darmstadt.de
- Vladimir GerdtJoint Institute for Nuclear ResearchEmail verificata su jinr.ru
- Jason CramptonProfessor of Information Security, Royal Holloway, University of LondonEmail verificata su rhul.ac.uk
- Jonathan KatzProfessor of Computer Science, University of MarylandEmail verificata su cs.umd.edu
- Ranjit KumaresanEmail verificata su csail.mit.edu
- James AldermanThales Cyber and Consulting (UK)Email verificata su live.rhul.ac.uk
- Gaëtan LeurentINRIAEmail verificata su inria.fr
- Piotr MardzielindependentEmail verificata su cmu.edu
- Mudhakar SrivatsaResearch Scientist of Computer Science, IBM T. J. Watson Research CenterEmail verificata su us.ibm.com
- Steven GalbraithProfessor of Pure Mathematics, University of Auckland, NZEmail verificata su math.auckland.ac.nz