Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Yves RoudierProfessor, UCA - I3S - CNRS - Université Côte d'AzurEmail verificata su i3s.unice.fr
- Olaf HennigerFraunhofer-GesellschaftEmail verificata su igd.fraunhofer.de
- Timo GendrullisRuhr University Bochum, ESCRYPT, ETAS, BoschEmail verificata su rub.de
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Ludovic ApvrilleTelecom ParisEmail verificata su telecom-paris.fr
- Sebastian SteinhorstAssociate Professor, Dept. of Computer Engineering, Technical University of MunichEmail verificata su tum.de
- Thomas EisenbarthUniversity of LübeckEmail verificata su uni-luebeck.de
- Jan PelzlProfessor für Cybersecurity, University of Applied Sciences Hamm LippstadtEmail verificata su hshl.de
- Thomas PeyrinProfessor, Nanyang Technological UniversityEmail verificata su ntu.edu.sg
- Florian SagstetterResearch AssociateEmail verificata su tum-create.edu.sg
- Samarjit ChakrabortyKenan Professor of Computer Science, The University of North Carolina at Chapel HillEmail verificata su cs.unc.edu
- Alastair RuddleChief Scientist, Vehicle Resilience Technologies, HORIBA MIRA LimitedEmail verificata su horiba-mira.com
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Axel Y. PoschmannVP of ProductEmail verificata su pqshield.com
- Martin LukasiewyczGoogleEmail verificata su google.com
- N. AsokanProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Michael FriedewaldFraunhofer Inst. Syst. & Innov. ResearchEmail verificata su isi.fraunhofer.de
- antonio kungTrialogEmail verificata su trialog.com
- Dries SchellekensCOSIC, KU Leuven, SeptentrioEmail verificata su esat.kuleuven.be