Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Ayoub OtmaniUniversity of RouenVerified email at univ-rouen.fr
Jean-Pierre TillichResearcher at INRIA ParisVerified email at inria.fr
Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
Guénaël RenaultANSSI, INRIA, LIX, IPPVerified email at lix.polytechnique.frPooya FarshimIOG Research & Durham UniversityVerified email at iohk.io
Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nlNelly FazioAssociate Professor, City College & Graduate Center of CUNYVerified email at cs.ccny.cuny.edu
Antonio NicolosiStevens Institute of TechnologyVerified email at cs.stevens.edu
Elias TsigaridasINRIAVerified email at inria.fr
Keita XagawaTechnology Innovation Institute (TII)Verified email at tii.ae
Antoine JouxCISPAVerified email at cispa.saarland
Pierre-Jean SpaenlehauerInriaVerified email at inria.fr
Domingo GómezProfesor de Informática (Unican)Verified email at unican.esEmmanuel ProuffSecurity Manager at AppleVerified email at apple.com