Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
- Jean-Pierre TillichResearcher at INRIA ParisVerified email at inria.fr
- Ayoub OtmaniUniversity of RouenVerified email at univ-rouen.fr
- Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
- Guénaël RenaultANSSI, INRIA, LIX, IPPVerified email at lix.polytechnique.fr
- Pooya FarshimIOG Research & Durham UniversityVerified email at durham.ac.uk
- Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
- Nelly FazioAssociate Professor, City College & Graduate Center of CUNYVerified email at cs.ccny.cuny.edu
- Antonio NicolosiStevens Institute of TechnologyVerified email at cs.stevens.edu
- Elias TsigaridasINRIAVerified email at inria.fr
- Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Keita XagawaTechnology Innovation Institute (TII)Verified email at tii.ae
- Antoine JouxCISPAVerified email at cispa.saarland
- Pierre-Jean SpaenlehauerInriaVerified email at inria.fr
- Domingo GómezProfesor de Informática (Unican)Verified email at unican.es
- Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com