Get my own profile
Public access
View all38 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Thomas CreutzigProfessor of Mathematics at the University of AlbertaVerified email at ualberta.ca
- Yasuaki HikidaAssociate Professor, YITP, Kyoto UniversityVerified email at yukawa.kyoto-u.ac.jp
- Vincenzo IovinoAragon ZK ResearchVerified email at aragon.org
- Marie-Laure ZollingerUniversity of LuxembourgVerified email at uni.lu
- Thomas HainesAustralian National UniversityVerified email at anu.edu.au
- Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
- Hao ChengUniversity of LuxembourgVerified email at uni.lu
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
- Jan LagerwallUniversity of LuxembourgVerified email at lcsoftmatter.com
- Yong Genguniversity of luxembourgVerified email at uni.lu
- Alfredo RialUniversity of LuxembourgVerified email at uni.lu
- Kristian GjøsteenNTNUVerified email at ntnu.no
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Carine LallemandEindhoven University of Technology & University of LuxembourgVerified email at tue.nl
- Verena DistlerUniversity of the Bundeswehr MunichVerified email at unibw.de
- Vincent KoenigUniversity of LuxembourgVerified email at uni.lu
- Wojciech JamrogaPolish Academy of SciencesVerified email at ipipan.waw.pl
- Niels ObersNiels Bohr Institute & NorditaVerified email at nbi.dk
- David Duenas-CidAssociate Prof., Director of the Public Sector Data-Driven Technologies Research CenterVerified email at kozminski.edu.pl