Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Marie-Laure Potetlaboratoire VERIMAG - Grenoble Alpes UniversityVerified email at univ-grenoble-alpes.fr
Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
Jean-Louis RochEnsimag, Grenoble-INP, Grenoble UniversityVerified email at grenoble-inp.fr
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble AlpesVerified email at imag.fr
Lionel RivièrePhD, Security Analyst at eShardVerified email at eshard.com
Julien BringerKallistechVerified email at kallistech.com
Laurent MounierVERIMAG University of Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Stéphane MocanuLaboratoire d'Informatique de GrenobleVerified email at grenoble-inp.fr
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Herve ChabanneProfesseur associé à Télécom ParisTechVerified email at telecom-paristech.fr
Clément PernetUniversité Grenoble Alpes, LJKVerified email at univ-grenoble-alpes.fr
Vincent BeroulleUniv. Grenoble AlpesVerified email at lcis.grenoble-inp.fr