Crea il mio profilo
Accesso pubblico
Visualizza tutto37 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenEmail verificata su cs.kuleuven.be
- Daniel GrussGraz University of TechnologyEmail verificata su iaik.tugraz.at
- Raoul StrackxFortanixEmail verificata su fortanix.com
- Jan Tobias MuehlbergProf. for Embedded Systems Security, Universite Libre de Bruxelles, BelgiumEmail verificata su ulb.be
- Yuval YaromRuhr University BochumEmail verificata su rub.de
- Daniel GenkinGeorgia TechEmail verificata su gatech.edu
- Marina MinkinUniversity of MichiganEmail verificata su umich.edu
- Michael SchwarzCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de
- Moritz LippEmail verificata su mlq.me
- Daniel MoghimiSenior Research Scientist, GoogleEmail verificata su google.com
- David OswaldSecurity and Privacy Group, University of BirminghamEmail verificata su bham.ac.uk
- Mark SilbersteinProfessor, Technion, IsraelEmail verificata su ee.technion.ac.il
- Thomas F. WenischProf. of CSE, University of MichiganEmail verificata su umich.edu
- Ofir WeisseUniversity of MichiganEmail verificata su umich.edu
- Flavio D. GarciaProfessor of Computer Security, University of BirminghamEmail verificata su bham.ac.uk
- Claudio CanellaAmazon Web ServicesEmail verificata su amazon.com
- Julian StecklinaEngineer at Cyberus TechnologyEmail verificata su os.inf.tu-dresden.de
- Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergEmail verificata su cs.fau.de
- Nico WeichbrodtTU Braunschweig, IBREmail verificata su ibr.cs.tu-bs.de