Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Yannick ChevalierMaître de Conférences en informatique, IRIT, Université Toulouse 3Verified email at irit.fr
Alessandro ArmandoUniversity of GenovaVerified email at unige.it
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Luca ViganòProfessor of Computer Science, Head of Cybersecurity Group, Dep. of Informatics, King's CollegeVerified email at kcl.ac.uk
Jieh HsiangNational Taiwan UniversityVerified email at ntu.edu.tw
Pascal MolliUniversity of NantesVerified email at univ-nantes.fr
Gérald OsterAssistant Professor, Université de Lorraine, TELECOM Nancy, InriaVerified email at loria.fr
Sebastian Alexander MödersheimAssociate Professor of Computer Science, Denmark's Technical UniversityVerified email at imm.dtu.dk
Gregory KucherovDirecteur de recherche CNRS, LIGM, Université Gustave Eiffel, FranceVerified email at univ-mlv.fr
Olga KouchnarenkoFEMTO-ST and UFC/UBFCVerified email at univ-fcomte.fr
Silvio RaniseFBKVerified email at fbk.eu
Véronique CortierCNRS, LORIAVerified email at loria.fr
Rakesh Verma, Rakesh M. Verma, RM...Professor of Computer Science, University of HoustonVerified email at uh.edu
Eugen ZalinescuNomadic LabsVerified email at nomadic-labs.com
Robert NieuwenhuisProfessor of Computer Science, Tech. Univ. Catalonia (UPC), BarcelonaVerified email at cs.upc.edu
Marius MineaAssociate Professor, Politehnica University of TimisoaraVerified email at cs.upt.ro
Roberto CarboneSecurity and Trust - Fondazione Bruno Kessler, Trento, ItalyVerified email at fbk.eu
Serena Elisa PontaSAP Security ResearchVerified email at sap.com
Aditya SehgalParity Computing Inc.Verified email at acm.org