Crea il mio profilo
Accesso pubblico
Visualizza tutto29 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Markus KuhnDepartment of Computer Science and Technology, University of CambridgeEmail verificata su cl.cam.ac.uk
- Fabien A. P. PetitcolasSmals ResearchEmail verificata su smals.be
- Tyler MooreTandy Professor of Cyber Security and Information Assurance, University of TulsaEmail verificata su utulsa.edu
- Ilia ShumailovGoogle DeepMindEmail verificata su google.com
- Steven J. MurdochDepartment of Computer Science, University College LondonEmail verificata su ucl.ac.uk
- Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabEmail verificata su cl.cam.ac.uk
- Robert MullinsDepartment of Computer Science and Technology, University of CambridgeEmail verificata su cl.cam.ac.uk
- Sergei SkorobogatovCambridge Research and EngineeringEmail verificata su hushmail.com
- Lars Ramkilde KnudsenSDUEmail verificata su ramkildeknudsen.dk
- Ronald L. RivestMIT Institute ProfessorEmail verificata su mit.edu
- Jeff YanProfessor of Cyber SecurityEmail verificata su acm.org
- Rainer BöhmeUniversität Innsbruck, AustriaEmail verificata su uibk.ac.at
- Hyoungshick KimSungkyunkwan UniversityEmail verificata su skku.edu
- Steven BellovinProfessor of Computer Science, Columbia UniversityEmail verificata su cs.columbia.edu
- Laurent SimonCambridge UniversityEmail verificata su cl.cam.ac.uk
- Simon MooreProfessor of Computer Engineering, University of CambridgeEmail verificata su cl.cam.ac.uk
- J. DaugmanProfessor of Computer Vision and Pattern Recognition, Cambridge UniversityEmail verificata su cl.cam.ac.uk
- Joseph BonneauNew York UniversityEmail verificata su cs.nyu.edu
- Harry ManifavasSenior Research Collaborator @ ICS-FORTHEmail verificata su ics.forth.gr
- George DanezisMysten Labs & University College LondonEmail verificata su ucl.ac.uk