Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Hervé DebarProfesseur, Télécom SudParis, Institut Mines-Télécom, Institut Polytechnique de ParisVerified email at telecom-sudparis.eu
Olivier ThonnardDirector Security Operations, AmadeusVerified email at amadeus.com
Corrado LeitaLastline Inc.Verified email at lastline.com
Yves DeswarteResearcher, LAAS-CNRSVerified email at laas.fr
Van-Hau PhamLecturer of Information Security, University of Information Technology - VNUVerified email at uit.edu.vn
Mohamed KaanicheLAAS-CNRS, Toulouse, FranceVerified email at laas.fr
Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Brian RandellEmeritus Professor of Computing Science, Newcastle UniversityVerified email at ncl.ac.uk
Angelos D. KeromytisGeorgia Institute of TechnologyVerified email at gatech.edu
Paulo Esteves-VerissimoProfessor of Computer Science, RC3, CEMSE -- KAUSTVerified email at kaust.edu.sa
Pierre-Antoine VervierSymantec Research LabsVerified email at symantec.com
Michael WaidnerTU Darmstadt, ATHENE, Fraunhofer SITVerified email at tu-darmstadt.de
Andrew ClarkAdjunct Associate Professor of Information Security, Queensland University of TechnologyVerified email at qut.edu.au
Marco CovaVMware, Inc.Verified email at vmware.com
Jan CamenischDFINITYVerified email at dfinity.org
Matthieu HerrbCNRS LAASVerified email at laas.fr
Angelos StavrouProfessor at Virginia TechVerified email at vt.edu
Victor ShoupResearch Scientist, Offchain Labs; Professor Emeritus, NYUVerified email at shoup.net
Taoufik EN-NAJJARYOrange LabsVerified email at orange.com