Get my own profile
Public access
View all44 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Thomas CreutzigProfessor of Mathematics at the University of AlbertaVerified email at ualberta.ca
- Yasuaki HikidaAssociate Professor, YITP, Kyoto UniversityVerified email at yukawa.kyoto-u.ac.jp
- Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
- Marie-Laure ZollingerUniversity of LuxembourgVerified email at uni.lu
- David Duenas-CidAssociate Prof., Public Sector Data-Driven Technologies Research Center, Kozminski UniversityVerified email at kozminski.edu.pl
- Thomas HainesAustralian National UniversityVerified email at anu.edu.au
- Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
- Hao ChengUniversity of LuxembourgVerified email at uni.lu
- Carine LallemandEindhoven University of Technology & University of LuxembourgVerified email at tue.nl
- Verena DistlerAalto UniversityVerified email at unibw.de
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
- Jan LagerwallUniversity of LuxembourgVerified email at lcsoftmatter.com
- Yong Genguniversity of luxembourgVerified email at uni.lu
- Kristian GjøsteenNTNUVerified email at ntnu.no
- Alfredo RialUniversity of LuxembourgVerified email at uni.lu
- Vincent KoenigUniversity of LuxembourgVerified email at uni.lu
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Wojciech JamrogaPolish Academy of SciencesVerified email at ipipan.waw.pl
- Niels ObersNiels Bohr Institute & NorditaVerified email at nbi.dk