Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Jean-Pierre TillichResearcher at INRIA ParisVerified email at inria.fr
Ayoub OtmaniUniversity of RouenVerified email at univ-rouen.fr
Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
Guénaël RenaultANSSI, INRIA, LIX, IPPVerified email at lix.polytechnique.fr
Pooya FarshimIOG Research & Durham UniversityVerified email at iohk.io
Christophe PetitUniversité libre de Bruxelles - University of BirminghamVerified email at ulb.be
Nelly FazioAssociate Professor, City College & Graduate Center of CUNYVerified email at cs.ccny.cuny.edu
Antonio NicolosiStevens Institute of TechnologyVerified email at cs.stevens.edu
Elias TsigaridasINRIAVerified email at inria.fr
Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
Keita XagawaTechnology Innovation Institute (TII)Verified email at tii.ae
Antoine JouxCISPAVerified email at cispa.saarland
Pierre-Jean SpaenlehauerInriaVerified email at inria.fr
Domingo GómezProfesor de Informática (Unican)Verified email at unican.es
Emmanuel ProuffSecurity Manager at AppleVerified email at apple.com