Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Ciara RaffertyQueen's University BelfastVerified email at qub.ac.uk
Anupam ChattopadhyayAssociate Professor, SCSE, SPMS, NTU, SingaporeVerified email at ntu.edu.sg
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamVerified email at aau.at
Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.de
Mahabir Prasad JhanwarAssistant Professor, Ashoka UniversityVerified email at ashoka.edu.in
Thomas PrestPQShieldVerified email at pqshield.com
Daniel AponUniversity of MarylandVerified email at cs.umd.edu
Weiqiang LiuProfessor, Nanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
Mélissa RossiANSSIVerified email at ssi.gouv.fr
Thomas RicossetThalesVerified email at thalesgroup.com
Sarah McCarthyResearch Assistant, Centre for Secure Information Technologies, Queen's University BelfastVerified email at qub.ac.uk
Bas WesterbaanResearch Engineer, CloudflareVerified email at cloudflare.com
Michel AbdallaÉcole Normale SupérieureVerified email at ens.fr
Carlos Aguilar-MelchorChief Scientist, Cybersecurity, SandboxAQVerified email at sandboxquantum.com
Nicolas GamaChief Computer Scientist, Inpher and AP, Cryptologie, Université de VersaillesVerified email at uvsq.fr
Andreas HülsingAssociate Professor, Eindhoven University of TechnologyVerified email at tue.nl
Dongze YueSandbox AQVerified email at sandboxaq.com