Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Jean-Pierre TillichResearcher at INRIA ParisVerified email at inria.fr
Ayoub OtmaniUniversity of RouenVerified email at univ-rouen.fr
Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
Guénaël RenaultANSSI, INRIA, LIX, IPPVerified email at lix.polytechnique.fr
Pooya FarshimIOHK Research & Durham UniversityVerified email at durham.ac.uk
Christophe PetitUniversité libre de Bruxelles - University of Birmingham - University of OxfordVerified email at ulb.be
Nelly FazioAssociate Professor, City College & Graduate Center of CUNYVerified email at cs.ccny.cuny.edu
Antonio NicolosiStevens Institute of TechnologyVerified email at cs.stevens.edu
Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk
Elias TsigaridasINRIAVerified email at inria.fr
Antoine JouxCISPAVerified email at cispa.saarland
Keita XagawaTechnology Innovation Institute (TII)Verified email at tii.ae
Pierre-Jean SpaenlehauerInriaVerified email at inria.fr
Domingo GómezProfesor de Informática (Unican)Verified email at unican.es
Emmanuel ProuffDeputy Head of the Division Security Products and Services, ANSSIVerified email at ssi.gouv.fr