Get my own profile
Public access
View all23 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
Michael RusinowitchINRIAVerified email at loria.fr
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
Thomas GroßProfessor of System Security, Newcastle UniversityVerified email at ncl.ac.uk
Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
Pierre-Cyrille HeamUniversité de Franche-Comté, Computer ScienceVerified email at femto-st.fr
Jan CamenischDFINITYVerified email at dfinity.org
Achim D. BruckerUniversity of Exeter, Exeter, UKVerified email at exeter.ac.uk
Sören BleikertzResearcher, IBM Research - ZurichVerified email at zurich.ibm.com
Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeVerified email at tees.ac.uk
Gregory NevenChainlink LabsVerified email at smartcontract.com
Omar AlmousaJordan University of Science and TechnologyVerified email at just.edu.jo
Alessandro BruniAssociate Professor. IT-University of CopenhagenVerified email at itu.dk
Marius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Hanne Riis Nielsonprofessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk
Flemming NielsonProfessor at DTU Applied Mathematics and Computer ScienceVerified email at imm.dtu.dk