Get my own profile
Public access
View all57 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Xavier BultelINSA Centre-Val de LoireVerified email at insa-cvl.fr
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble AlpesVerified email at imag.fr
David GERAULTTIIVerified email at tii.ae
Léo ROBERTLIMOSVerified email at uca.fr
Stéphane DevismesProfessor at Université de Picardie Jules VerneVerified email at u-picardie.fr
Takaaki MizukiTohoku UniversityVerified email at cc.tohoku.ac.jp
Daiki MiyaharaThe University of Electro-CommunicationsVerified email at dc.tohoku.ac.jp
Ali KassemR&D at Ecole PolytechniqueVerified email at polytechnique.edu
Radu CiucanuINSA Centre Val de LoireVerified email at insa-cvl.fr
Karine AltisenMaître de Conférences, Grenoble INP / VerimagVerified email at imag.fr
Cristina OneteXLIM/CNRS 7252/Université de LimogesVerified email at unilim.fr
Maxime PuysCEA-TechVerified email at cea.fr
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
quentin BRAMASUniversité de StrasbourgVerified email at unistra.fr
Marius Lombard-PlatetEcole normale supérieureVerified email at ens.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
Cristian EneVerimag, University of Grenoble Alpes, FranceVerified email at univ-grenoble-alpes.fr
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de