Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
- Sasa RadomirovicUniversity of SurreyVerified email at surrey.ac.uk
- Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble Alpes, Laboratoire Jean KuntzmannVerified email at imag.fr
- Xavier BultelINSA Centre-Val de LoireVerified email at insa-cvl.fr
- Ali KassemR&D at Ecole PolytechniqueVerified email at polytechnique.edu
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Hugo JonkerOpen UniversiteitVerified email at ou.nl
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
- Rosario GiustolisiIT University of CopenhagenVerified email at itu.dk
- Steve KremerInriaVerified email at inria.fr
- Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Atsuki NagaoLecturer, Ochanomizu UniversityVerified email at is.ocha.ac.jp
- Daiki MiyaharaThe University of Electro-CommunicationsVerified email at uec.ac.jp
- Takaaki MizukiTohoku UniversityVerified email at cc.tohoku.ac.jp
- Maxime PuysUniv. Clermont AuvergneVerified email at uca.fr
Follow