Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Erik PollRadboud University NijmegenEmail verificata su cs.ru.nl
- Reiner HähnleProfessor of Computer Science, Technical University of DarmstadtEmail verificata su cs.tu-darmstadt.de
- Wolfgang AhrendtProfessor of Computer Science, Chalmers University of TechnologyEmail verificata su chalmers.se
- Richard BubelDepartment of Computer Science, TU DarmstadtEmail verificata su cs.tu-darmstadt.de
- Marieke HuismanEmail verificata su ewi.utwente.nl
- Andreas RothSAP SEEmail verificata su sap.com
- dr. ir. Pim VullersNXP SemiconductorsEmail verificata su vullersmail.nl
- Vladimir KlebanovSAP SE (previously at Karlsruhe Institute of Technology)Email verificata su sap.com
- Rosemary MonahanNational Univeristy of IrelandEmail verificata su mu.ie
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Radu GrigoreMetaEmail verificata su fb.com
- Dino DistefanoAnthropic and Queen Mary University of LondonEmail verificata su eecs.qmul.ac.uk
- Marc BrockschmidtResearch Scientist, Google DeepMindEmail verificata su google.com
- Jean-Christophe FilliâtreCNRSEmail verificata su lri.fr
- Stefan BlomUniversity of TwenteEmail verificata su utwente.nl
- Jaap-Henk HoepmanAssociate Professor of Computer Science, Radboud University NijmegenEmail verificata su cs.ru.nl
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenEmail verificata su cs.ru.nl
- Jan TretmansResearch Fellow, ESI (TNO), Eindhoven; and Assoc. Prof., Radboud University, NijmegenEmail verificata su cs.ru.nl
- Julien SchmaltzCGIEmail verificata su cgi.com
- Ronny Wichers SchreurProgrammer, Radboud University NijmegenEmail verificata su cs.ru.nl