Crea il mio profilo
Accesso pubblico
Visualizza tutto62 articoli
54 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Hwajeong SeoProfessor, Hansung University, South KoreaEmail verificata su hansung.ac.kr
- Johann GroßschädlResearch Specialist, University of LuxembourgEmail verificata su uni.lu
- Jongseok ChoiPusan National UniversityEmail verificata su pusan.ac.kr
- Chunhua SuDivision of Computer Science, University of Aizu, JapanEmail verificata su u-aizu.ac.jp
- Ingrid VerbauwhedeKU LeuvenEmail verificata su esat.kuleuven.be
- Sujoy Sinha RoyAssistant Professor, IAIK, TU GrazEmail verificata su iaik.tugraz.at
- Patrick LongaPrincipal Researcher, Microsoft Research, USAEmail verificata su microsoft.com
- Geovandro PereiraSr Staff Automotive Security Engineer, LG Electronics, USAEmail verificata su uwaterloo.ca
- Kimmo JärvinenXiphera Ltd.Email verificata su xiphera.com
- Reza AzarderakhshProfessor at FAU and Founder of PQSecureEmail verificata su fau.edu
- Oscar ReparazCOSIC / KU LeuvenEmail verificata su esat.kuleuven.be
- Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Email verificata su ksu.edu.sa
- Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongEmail verificata su cityu.edu.hk
- Praveen Kumar VadnalaRiscureEmail verificata su riscure.com
- Srinivas VivekInternational Institute of Information Technology, BangaloreEmail verificata su iiitb.ac.in
- David GalindoCTO, Valory AGEmail verificata su valory.xyz
- Erich WengerInfineon TechnologiesEmail verificata su infineon.com
- Ilya KizhvatovBioNTech SEEmail verificata su biontech.de
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumEmail verificata su rub.de