Crea il mio profilo
Accesso pubblico
Visualizza tutto34 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Thomas PeyrinProfessor, Nanyang Technological UniversityEmail verificata su ntu.edu.sg
Zhenzhen BaoTsinghua UniversityEmail verificata su tsinghua.edu.cn
Ling SongJinan University, Guangzhou, ChinaEmail verificata su jnu.edu.cn
Axel Y. PoschmannVP of ProductEmail verificata su pqshield.com
S LingNanyang Technological UniversityEmail verificata su ntu.edu.sg
Meicheng LiuInstitute of Information Engineering, Chinese Academy of SciencesEmail verificata su iie.ac.cn
Huaxiong WangNanyang Technological University, SingaporeEmail verificata su ntu.edu.sg
Jérémy JEANANSSIEmail verificata su ssi.gouv.fr
Krystian MatusiewiczSecurity Researcher at IntelEmail verificata su intel.com
Ivica NikolićNational University of SingaporeEmail verificata su nus.edu.sg
Kexin QiaoChinese Academy of SciencesEmail verificata su iie.ac.cn
Matthew RobshawTechnical Fellow, Impinj Inc.Email verificata su impinj.com
Kazuhiko MinematsuNEC CorporationEmail verificata su nec.com
Xiaoyang DongAssociate Professor, Tsinghua UniversityEmail verificata su tsinghua.edu.cn
Christian RechbergerGraz University of TechnologyEmail verificata su tugraz.at
Ron SteinfeldAssociate Professor, Monash UniversityEmail verificata su monash.edu
Eik ListChair of Media Security, Bauhaus-Universität WeimarEmail verificata su uni-weimar.de
Guozhen LiuUniversity of Chinese Academy of SciencesEmail verificata su ucas.ac.cn
Vincent RijmenUniversity of Leuven (KU Leuven)Email verificata su esat.kuleuven.be
Bing SunNational University of Defense TechnologyEmail verificata su kuleuven.be