Get my own profile
Public access
View all45 articles
12 articles
available
not available
Based on funding mandates
Co-authors
- Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
- Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
- Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
- Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Zakaria NajmResearch Associate,NTU SingaporeVerified email at ntu.edu.sg
- Annelie HeuserCNRS researcherVerified email at irisa.fr
- Debapriya Basu RoyAssistant Professor, IIT KanpurVerified email at cse.iitk.ac.in
- Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
- Noriyuki MiuraOsaka UniversityVerified email at ist.osaka-u.ac.jp
- Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
- Naofumi HommaTohoku UniversityVerified email at riec.tohoku.ac.jp
- Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
- Laurent SauvageInstitut Mines-TélécomVerified email at telecom-paris.fr
- Bernhard JungkAlbstadt-Sigmaringen UniversityVerified email at hs-albsig.de
- Guillaume DucMaître de Conférences, Télécom ParisVerified email at telecom-paris.fr
- Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
- Olivier RioulProfesseur, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
- Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr