Crea il mio profilo
Accesso pubblico
Visualizza tutto24 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jean-Pierre HubauxProfessor, EPFLEmail verificata su epfl.ch
- Zygmunt J. HaasCornell UniversityEmail verificata su ee.cornell.edu
- Mohammad KhodaeiScaniaEmail verificata su scania.com
- Frank KarglProfessor of Computer Science, Ulm UniversityEmail verificata su uni-ulm.de
- Stylianos GisdakisKunglika Tekniska HögskolanEmail verificata su kth.se
- Thanassis GiannetsosHead of Unit - Secure Systems & Trusted Computing Group at UBITECHEmail verificata su ubitech.eu
- Levente ButtyanProfessor, Budapest University of Technology and EconomicsEmail verificata su crysys.hu
- Hongyu JinKTHEmail verificata su kth.se
- antonio kungTrialogEmail verificata su trialog.com
- Reza ShokriNational University of Singapore; MicrosoftEmail verificata su comp.nus.edu.sg
- Kewei ZhangPhD Student, KTH Royal Institute of TechnologyEmail verificata su kth.se
- Imad AadCenter for Digital Trust (C4DT), EPFLEmail verificata su aad.me
- Antonio LioyFull Professor of Computer Engineering, Politecnico di TorinoEmail verificata su polito.it
- Jean-Yves Le BoudecHonorary professor of communication systems, EPFLEmail verificata su epfl.ch
- Aleksandar JovanovicPhDEmail verificata su alumni.epfl.ch
- George TheodorakopoulosCardiff UniversityEmail verificata su cardiff.ac.uk
- Zhendong MaLuxoft / DXC TechnologyEmail verificata su dxc.com
- Matthias GrossglauserEPFLEmail verificata su epfl.ch
- Marco SpangheroKTH Royal Institute of TechnologyEmail verificata su kth.se
- Karl AbererProfessor of Computer and Communication Sciences, EPFLEmail verificata su epfl.ch