Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Natalia VoloshinaITMO UniversityVerified email at itmo.ru
Sergey AndreevTampere University, FinlandVerified email at tuni.fi
Jarmo HarjuTietoliikennetekniikan emeritusprofessori, Tampereen teknillinen yliopistoVerified email at tut.fi
Antonia Wachter-ZehProfessor at Technical University of Munich (TUM)Verified email at tum.de
Mohammed Zaki AhmedPlymouth UniversityVerified email at plymouth.ac.uk
Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
Mubarak JibrilUniversity of plymouthVerified email at plymouth.ac.uk
Roman FloreaGoogleVerified email at google.com
Markus GrasslInternational Centre for Theory of Quantum Technologies (ICTQT) , University GdanskVerified email at ug.edu.pl
Maximilien GadouleauAssociate Professor in Computer Science, Durham UniversityVerified email at durham.ac.uk
Jiri HosekBrno University of TechnologyVerified email at feec.vutbr.cz
Alla LevinaLETI UniversityVerified email at etu.ru
Komosny DanBrno University of TechnologyVerified email at vut.cz
Kathiravelu GaneshanSenior Lecturer, Otago Polytechnic, Auckland International CampusVerified email at edenz.ac.nz
Miroslav VoznakTechnical University of OstravaVerified email at vsb.cz
Sergey AndreevNRC Institute of Immunology, MoscowVerified email at immune.umos.ru
Yevgeni KoucheryavyHSE University
Follow
Bezzateev Sergey
Saint Petersburg State University of Aerospace Instrumentation, Department of Information Security
Verified email at guap.ru