Get my own profile
Public access
View all13 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ioannis PsarasResearch Scientist, Protocol LabsVerified email at protocol.ai
Alberto SonninoResearcher, University College LondonVerified email at ucl.ac.uk
Etienne RivièreProfessor, UCLouvainVerified email at uclouvain.be
Onur AscigilLancaster University, University College LondonVerified email at lancaster.ac.uk
Sergi Reñé VicenteDataHop LabsVerified email at datahop.network
Dirk KutscherThe Hong Kong University of Science and Technology (Guangzhou)Verified email at dkutscher.net
Enrico NatalizioChief Researcher @ TII, Abu Dhabi, UAE and Full Professor @ UL, Nancy, FranceVerified email at inria.fr
Argyrios G. TasiopoulosUnaffiliatedVerified email at ucl.ac.uk
Andrzej DudaProfessor of Computer Science, Grenoble Institute of Technology, EnsimagVerified email at imag.fr
Mustafa Al-BassamUniversity College LondonVerified email at ucl.ac.uk
Milan ErdeljConsultant @ SCILYNXVerified email at scilynx.com
Franck RousseauUniv. Grenoble Alpes - Grenoble INP EnsimagVerified email at imag.fr
Lixia ZhangProfessor of Computer Science, UCLAVerified email at cs.ucla.edu
Spyridon MastorakisUniversity of Notre DameVerified email at nd.edu
Eryk SchillerUniversity of Applied Sciences of Western SwitzerlandVerified email at hes-so.ch
Michel van EetenProfessor, Governance of Cybersecurity, TU DelftVerified email at tudelft.nl
Bernard TourancheauProfesseur Université Grenoble Alpes - UMR CNRS LIG - LIGlab.fr - Drakkar.imag.frVerified email at univ-grenoble-alpes.fr
Mališa Vučinić Research Scientist, InriaVerified email at inria.fr
Lei ZhongToyota Motor CorporationVerified email at toyota-tokyo.tech
Cristian BorceaProfessor, Department of Computer Science, New Jersey Institute of TechnologyVerified email at njit.edu