Crea il mio profilo
Accesso pubblico
Visualizza tutto32 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Véronique CortierCNRS, LORIAEmail verificata su loria.fr
- Nigel SmartKU LeuvenEmail verificata su kuleuven.be
- Alexandra BoldyrevaProfessor, School of Cybersecurity and Privacy, Georgia Institute of TechnologyEmail verificata su gatech.edu
- Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyEmail verificata su tu-darmstadt.de
- Olivier PereiraUCLouvainEmail verificata su uclouvain.be
- Manuel BarbosaUniversidade do Porto (FCUP) and INESC TECEmail verificata su fc.up.pt
- Steve KremerInriaEmail verificata su inria.fr
- Dario CatalanoProfessor of Computer Science, University of CataniaEmail verificata su dmi.unict.it
- Jan CamenischDFINITYEmail verificata su dfinity.org
- Gregory NevenChainlink LabsEmail verificata su smartcontract.com
- Martin AbadiResearch Scientist, Google, and Professor Emeritus, UC Santa CruzEmail verificata su cs.ucsc.edu
- Bernardo PortelaINESC TEC, FCUPEmail verificata su fc.up.pt
- Guillaume ScerriMaître de conférences, Université Versailles Saint-Quentin en YvelinesEmail verificata su lsv.ens-cachan.fr
- Chris BrzuskaAalto UniversityEmail verificata su aalto.fi
- Dario FioreAssociate Research Professor, IMDEA Software InstituteEmail verificata su imdea.org
- Laurent MazaréKyutaiEmail verificata su polytechnique.org
- Essam GhadafiSenior Lecturer, Newcastle UniversityEmail verificata su ncl.ac.uk
- Georg FuchsbauerTU WienEmail verificata su ist.ac.at
- Anupam DattaProfessor, Electrical and Computer Engineering & Computer Science Departments, CMUEmail verificata su cmu.edu
- John C MitchellProfessor of Computer Science, Stanford UniversityEmail verificata su Stanford.edu