Crea il mio profilo
Accesso pubblico
Visualizza tutto28 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Steve KremerInriaEmail verificata su inria.fr
Bruno BlanchetSenior researcher, INRIA, ParisEmail verificata su inria.fr
Stéphanie DelauneUniv Rennes, CNRS, IRISAEmail verificata su irisa.fr
Véronique CortierCNRS, LORIAEmail verificata su loria.fr
Mark D. RyanProfessor of Computer Security, University of BirminghamEmail verificata su bham.ac.uk
Hubert Comon-LundhComputer Science professor, ENS CachanEmail verificata su lsv.ens-cachan.fr
Jiangshan Yu (于江山)Associate Professor, University of SydneyEmail verificata su sydney.edu.au
Myrto ArapinisSchool of Informatics, University of EdinburghEmail verificata su inf.ed.ac.uk
Stefan CiobacaAlexandru Ioan Cuza UniversityEmail verificata su info.uaic.ro
Rohit ChadhaUniversity of MissouriEmail verificata su missouri.edu
Charlie JacommeUniversité de Lorraine, LORIA, Inria Nancy Grand-EstEmail verificata su inria.fr
Karthikeyan BhargavanINRIAEmail verificata su inria.fr
Christopher A. WoodRIT, UCI, Cloudflare, AppleEmail verificata su heapingbits.net
Kushal BabelPhD Student, Cornell UniversityEmail verificata su cornell.edu
Lucca HirschiTenured Inria Researcher @ LoriaEmail verificata su inria.fr
Bogdan WarinschiUniversity of Bristol and DfinityEmail verificata su cs.bris.ac.uk
Alexander DaxPhD Student, Saarland University, CISPA Helmholtz Center for Information SecurityEmail verificata su stud.uni-saarland.de
Cas CremersCISPA Helmholtz Center for Information SecurityEmail verificata su cispa.de