Get my own profile
Public access
View all25 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
David BasinProfessor of Computer Science, ETH Zurich; Affiliated Faculty, INSAIT, Sofia UniversityVerified email at inf.ethz.ch
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
Michael RusinowitchINRIAVerified email at loria.frAlessandro ArmandoUniversity of GenovaVerified email at unige.it
Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
Jan CamenischVerified email at camenisch.org
Achim D. BruckerUniversity of Exeter, Exeter, UKVerified email at exeter.ac.uk
Olga KouchnarenkoFEMTO-ST and UMLPVerified email at univ-fcomte.fr
Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
Sören BleikertzResearcher, IBM Research - ZurichVerified email at zurich.ibm.comPaolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeVerified email at tees.ac.uk
Gregory NevenChainlink LabsVerified email at smartcontract.com
Omar AlmousaJordan University of Science and TechnologyVerified email at just.edu.jo
Alessandro BruniAssociate Professor. IT-University of CopenhagenVerified email at itu.dkMarius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.euSerena Elisa PontaSAP Security ResearchVerified email at sap.com
Hanne Riis Nielsonprofessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk
Flemming NielsonProfessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk