Get my own profile
Public access
View all8 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Michael RusinowitchINRIAVerified email at loria.fr
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Marco RocchettoV-ResearchVerified email at v-research.it
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Marius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
Alberto Calvi, PhDUniversity of VeronaVerified email at univr.it
Joaquin Garcia-AlfaroSAMOVAR, Telecom SudParis, Institut Polytechnique de ParisVerified email at ieee.org
Wiem TounsiPhD from Telecom Bretagne - Institut Mines-Telecom / Post-Doctoral Research Fellow LIP6Verified email at telecom-bretagne.eu
Frédéric CuppensPolytechnique MontréalVerified email at polymtl.ca