Get my own profile
Public access
View all23 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- Michael RusinowitchINRIAVerified email at loria.fr
- Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
- Achim D. BruckerUniversity of Exeter, Exeter, UKVerified email at exeter.ac.uk
- Jan CamenischDFINITYVerified email at dfinity.org
- Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
- Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
- Sören BleikertzResearcher, IBM Research - ZurichVerified email at zurich.ibm.com
- Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeVerified email at tees.ac.uk
- Omar AlmousaJordan University of Science and TechnologyVerified email at just.edu.jo
- Gregory NevenChainlink LabsVerified email at smartcontract.com
- Alessandro BruniAssociate Professor. IT-University of CopenhagenVerified email at itu.dk
- Marius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Hanne Riis Nielsonprofessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk
- Flemming NielsonProfessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk