Get my own profile
Public access
View all32 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
- Mark D. RyanProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
- Olivier MarkowitchUniversité Libre de Bruxelles, BelgiumVerified email at ulb.be
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Vincent ChevalUniversity of Oxford, United KingdomVerified email at cs.ox.ac.uk
- Graham SteelINRIAVerified email at cryptosense.com
- Jean-François RaskinUniversité Libre de Bruxelles, U.L.B.Verified email at ulb.ac.be
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Rohit ChadhaUniversity of MissouriVerified email at missouri.edu
- Ben SmythFounder-CEO, x26.ioVerified email at bensmyth.com
- Stefan CiobacaAlexandru Ioan Cuza UniversityVerified email at info.uaic.ro
- Myrto ArapinisSchool of Informatics, University of EdinburghVerified email at inf.ed.ac.uk
- Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
- Matteo MaffeiFull Professor at TU Wien, Co-Director TU Wien Cybersecurity CenterVerified email at tuwien.ac.at
- Laurent MazaréKyutaiVerified email at polytechnique.org
- Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
- Andre ScedrovProfessor of Mathematics, Professor of Computer and Information Science, University of PennsylvaniaVerified email at math.upenn.edu
- Michael BackesChairman and Founding Director of the CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Céline ChevalierAssistant Professor of Computer Science, Université Paris 2Verified email at ens.fr