Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
Sasa RadomirovicUniversity of SurreyVerified email at surrey.ac.uk
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble Alpes, Laboratoire Jean KuntzmannVerified email at imag.fr
Xavier BultelINSA Centre-Val de LoireVerified email at insa-cvl.fr
Ali KassemR&D at Ecole PolytechniqueVerified email at polytechnique.edu
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Rosario GiustolisiIT University of CopenhagenVerified email at itu.dk
Steve KremerInriaVerified email at inria.fr
Florian KerschbaumUniversity of WaterlooVerified email at uwaterloo.ca
Véronique CortierCNRS, LORIAVerified email at loria.fr
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Atsuki NagaoLecturer, Ochanomizu UniversityVerified email at is.ocha.ac.jp
Daiki MiyaharaThe University of Electro-CommunicationsVerified email at uec.ac.jp
Takaaki MizukiTohoku UniversityVerified email at cc.tohoku.ac.jp
Maxime PuysUniv. Clermont AuvergneVerified email at uca.fr
Follow