Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Jorge Luis VillarUniversitat Politecnica de CatalunyaVerified email at upc.edu
- Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
- Javier HerranzUniversitat Politècnica de CatalunyaVerified email at upc.edu
- Srinivas VivekInternational Institute of Information Technology, BangaloreVerified email at iiitb.ac.in
- Georg FuchsbauerTU WienVerified email at ist.ac.at
- Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
- Carla RàfolsUniversitat Pompeu FabraVerified email at upf.edu
- Pierre-Louis CayrelAss. Professor - Université Jean Monnet - Saint-EtienneVerified email at univ-st-etienne.fr
- Rodrigo RomanAssociate Professor, University of Malaga, SpainVerified email at lcc.uma.es
- Javier LopezProfessor of Computer Science, University of MalagaVerified email at lcc.uma.es
- Pascal Véronmaître de conférences, Université de ToulonVerified email at univ-tln.fr
- Olivier PereiraUCLouvainVerified email at uclouvain.be
- Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
- Tomasz TruderungComputer Science, University of TrierVerified email at uni-trier.de
- Ichiro HasuoProfessor of Computer Science, National Institute of InformaticsVerified email at acm.org
- Praveen Kumar VadnalaRiscureVerified email at riscure.com
- Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
- Zhe LiuProfessor, Nanjing University of Aeronautics and AstronauticsVerified email at nuaa.edu.cn
- Eric VerheulPart-time Professor Financial Information Security, Radboud University NijmegenVerified email at cs.ru.nl