Get my own profile
Public access
View all7 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Michael RusinowitchINRIAVerified email at loria.fr
- Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
- Alessandro ArmandoUniversity of GenovaVerified email at unige.it
- Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
- Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
- Giancarlo PellegrinoCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Marco RocchettoV-ResearchVerified email at v-research.it
- Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
- Marius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
- Alberto Calvi, PhDUniversity of VeronaVerified email at univr.it
- Joaquin Garcia-AlfaroSAMOVAR, Telecom SudParis, Institut Polytechnique de ParisVerified email at ieee.org
- Wiem TounsiPhD from Telecom Bretagne - Institut Mines-Telecom / Post-Doctoral Research Fellow LIP6Verified email at telecom-bretagne.eu
- Frédéric CuppensPolytechnique MontréalVerified email at polymtl.ca