Get my own profile
Public access
View all37 articles
1 article
available
not available
Based on funding mandates
Co-authors
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Thomas CreutzigProfessor of Mathematics at the University of AlbertaVerified email at ualberta.ca
Yasuaki HikidaAssociate Professor, YITP, Kyoto UniversityVerified email at yukawa.kyoto-u.ac.jp
Vincenzo IovinoUniversity of SalernoVerified email at unisa.it
Marie-Laure ZollingerUniversity of LuxembourgVerified email at uni.lu
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
Jan LagerwallUniversity of LuxembourgVerified email at lcsoftmatter.com
Yong Genguniversity of luxembourgVerified email at uni.lu
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Carine LallemandEindhoven University of Technology & University of LuxembourgVerified email at tue.nl
Dr. Verena DistlerUniversity of Luxembourg, Human-Computer Interaction Research GroupVerified email at uni.lu
Vincent KoenigUniversity of LuxembourgVerified email at uni.lu
Alfredo RialUniversity of LuxembourgVerified email at uni.lu
Kristian GjøsteenNTNUVerified email at ntnu.no
Wojciech JamrogaPolish Academy of SciencesVerified email at ipipan.waw.pl
Steve KremerInriaVerified email at inria.fr
Ann-Katrin WessleinVerified email at arcor.de
Volker SchomerusDESY Theory GroupVerified email at desy.de
Rosario GiustolisiIT University of CopenhagenVerified email at itu.dk
Daniel GrumillerTU Wien (Vienna University of Technology)Verified email at hep.itp.tuwien.ac.at