Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ioannis PsarasResearch Scientist, Protocol LabsVerified email at protocol.ai
Alberto SonninoResearcher, University College LondonVerified email at ucl.ac.uk
Etienne RivièreProfessor, UCLouvainVerified email at uclouvain.be
Onur AscigilLancaster University, University College LondonVerified email at lancaster.ac.uk
Enrico NatalizioVice President @ TII, Abu Dhabi, UAE and Full Professor @ UL, Nancy, FranceVerified email at inria.fr
Dirk KutscherThe Hong Kong University of Science and Technology (Guangzhou)Verified email at dkutscher.net
Sergi Reñé VicenteUniversity College of LondonVerified email at ucl.ac.uk
Argyrios G. TasiopoulosUnaffiliatedVerified email at ucl.ac.uk
Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagVerified email at imag.fr
Milan ErdeljConsultant @ SCILYNXVerified email at scilynx.com
Mustafa Al-BassamUniversity College LondonVerified email at ucl.ac.uk
Franck RousseauUniv. Grenoble Alpes - Grenoble INP EnsimagVerified email at imag.fr
Lixia ZhangProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
Spyridon MastorakisUniversity of Notre DameVerified email at nd.edu
Karim HabakGoogle LLCVerified email at google.com
Eryk SchillerUniversity of Applied Sciences of Western SwitzerlandVerified email at hes-so.ch
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Bernard TourancheauProfesseur Université Grenoble Alpes - UMR CNRS LIG - LIGlab.fr - Drakkar.imag.frVerified email at univ-grenoble-alpes.fr
Mališa Vučinić Research Scientist, InriaVerified email at inria.fr
Lei ZhongToyota Motor CorporationVerified email at toyota-tokyo.tech