Get my own profile
Public access
View all23 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Michael RusinowitchINRIAVerified email at loria.fr
Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
Achim D. BruckerUniversity of Exeter, Exeter, UKVerified email at exeter.ac.uk
Jan CamenischDFINITYVerified email at dfinity.org
Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
Sören BleikertzResearcher, IBM Research - ZurichVerified email at zurich.ibm.com
Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeVerified email at tees.ac.uk
Omar AlmousaJordan University of Science and TechnologyVerified email at just.edu.jo
Gregory NevenChainlink LabsVerified email at smartcontract.com
Alessandro BruniAssociate Professor. IT-University of CopenhagenVerified email at itu.dk
Marius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Hanne Riis Nielsonprofessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk
Flemming NielsonProfessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk