Get my own profile
Co-authors
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
xavier bultelLIMOS, Université Clermont AuvergneVerified email at irisa.fr
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble AlpesVerified email at imag.fr
David GERAULTLIMOSVerified email at etu.udamail.fr
Stéphane DevismesUniversité de Grenoble AlpesVerified email at univ-grenoble-alpes.fr
Ali KassemR&D at Ecole PolytechniqueVerified email at polytechnique.edu
Karine AltisenMaître de Conférences, Grenoble INP / VerimagVerified email at imag.fr
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Radu CiucanuINSA Centre Val de LoireVerified email at insa-cvl.fr
Maxime PuysCEA-LetiVerified email at cea.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Takaaki MizukiTohoku UniversityVerified email at cc.tohoku.ac.jp
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
nassira ghoualmi zineuniversité Badji MokhtarVerified email at lrs-annaba.net
Daiki MiyaharaGraduate School of Information Sciences, Tohoku UniversityVerified email at dc.tohoku.ac.jp
Hideaki SoneTohoku UniversityVerified email at cc.tohoku.ac.jp
Sébastien GambsUniversité du Québec à Montréal (UQAM)Verified email at uqam.ca
Panos PapadimitratosKTH (Royal Institute of Technology)Verified email at kth.se
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu