Get my own profile
Public access
View all18 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Thomas HainesAustralian National UniversityVerified email at anu.edu.au
- Tomasz TruderungComputer Science, University of TrierVerified email at uni-trier.de
- David GalindoCTO, Valory AGVerified email at valory.xyz
- Véronique CortierCNRS, LORIAVerified email at loria.fr
- Enrico ScapinReply S.p.A.Verified email at reply.it
- Ivan PryvalovBrandenburg University of TechnologyVerified email at b-tu.de
- Jan OupickýSnT/APSIA, University of LuxembourgVerified email at uni.lu
- Toomas KripsUniversity of TartuVerified email at ut.ee
- Alexander WiesmaierDarmstadt University of Applied SciencesVerified email at h-da.de
- Nouri AlnahawiDarmstadt University of Applied Sciences - University of RegensburgVerified email at h-da.de
- Kristian GjøsteenNTNUVerified email at ntnu.no
- Tjerand SildeAssociate Professor, Norwegian University of Science and TechnologyVerified email at ntnu.no
- Peter Browne RønneResearcherVerified email at nbi.dk
- Iñigo Querejeta-AzurmendiCryptography Engineer, IOG (IOHK)Verified email at iohk.io
- Jintai DingTHUVerified email at uc.edu
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Vonn Kee WongPhD student, University of CincinnatiVerified email at mail.uc.edu
- Balázs PejóCrySyS LabVerified email at crysys.hu