Get my own profile
Public access
View all34 articles
1 article
available
not available
Based on funding mandates
Co-authors
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Olivier MarkowitchUniversité Libre de Bruxelles, BelgiumVerified email at ulb.be
Véronique CortierCNRS, LORIAVerified email at loria.fr
Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
Graham SteelINRIAVerified email at cryptosense.com
Jean-François RaskinUniversité Libre de Bruxelles, U.L.B.Verified email at ulb.ac.be
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
Stefan CiobacaAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Laurent MazaréKyutaiVerified email at polytechnique.org
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaVerified email at math.upenn.edu
Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Verified email at ens.fr