Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Hervé DebarProfesseur, Télécom SudParis, Institut Mines-Télécom, Institut Polytechnique de ParisVerified email at telecom-sudparis.eu
Olivier ThonnardSecurity Expert, AmadeusVerified email at amadeus.com
Corrado LeitaLastline Inc.Verified email at lastline.com
Van-Hau PhamLecturer of Information Security, University of Information Technology - VNUVerified email at uit.edu.vn
Yves DeswarteResearcher, LAAS-CNRSVerified email at laas.fr
Mohamed KaanicheLAAS-CNRS, ANITI, Univ. ToulouseVerified email at laas.fr
Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
Michael WaidnerProfessor of Computer Science, TU Darmstadt, and Director, Fraunhofer SITVerified email at sit.tu-darmstadt.de
Pierre-Antoine VervierSymantec Research LabsVerified email at symantec.com
Andrew ClarkAdjunct Associate Professor of Information Security, Queensland University of TechnologyVerified email at qut.edu.au
Jan CamenischDFINITYVerified email at dfinity.org
Marco CovaVMware, Inc.Verified email at vmware.com
Matthieu HerrbCNRS LAASVerified email at laas.fr
Victor ShoupPrincipal Researcher, DFINITY; Professor Emeritus, NYUVerified email at dfinity.org
Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
Taoufik EN-NAJJARYOrange LabsVerified email at orange.com