Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- Jieh HsiangNational Taiwan UniversityVerified email at ntu.edu.tw
- Pascal MolliUniversity of NantesVerified email at univ-nantes.fr
- Gérald OsterAssistant Professor, Université de Lorraine, TELECOM Nancy, InriaVerified email at loria.fr
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
- Gregory KucherovDirecteur de recherche CNRS, LIGM, Univ Gaspard Monge, FranceVerified email at univ-mlv.fr
- Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
- Silvio RaniseFBKVerified email at fbk.eu
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Rakesh Verma, Rakesh M. Verma, RM...Professor of Computer Science, University of HoustonVerified email at uh.edu
- Eugen ZalinescuNomadic LabsVerified email at nomadic-labs.com
- Robert NieuwenhuisProfessor of Computer Science, Tech. Univ. Catalonia (UPC), BarcelonaVerified email at cs.upc.edu
- Marius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Aditya SehgalParity Computing Inc.Verified email at acm.org