Get my own profile
Public access
View all47 articles
12 articles
available
not available
Based on funding mandates
Co-authors
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Jakub BreierSenior Cybersecurity Manager, TTControl GmbH, Vienna, AustriaVerified email at ttcontrol.com
Anupam ChattopadhyayAssociate Professor, CCDS, NTU, SingaporeVerified email at ntu.edu.sg
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
Zakaria NajmResearch Associate,NTU SingaporeVerified email at ntu.edu.sg
Annelie HeuserCNRS researcherVerified email at irisa.fr
Debapriya Basu RoyAssistant Professor, IIT KanpurVerified email at cse.iitk.ac.in
Francesco RegazzoniUniversity of Amsterdam and Università della Svizzera italianaVerified email at alari.ch
Noriyuki MiuraOsaka UniversityVerified email at ist.osaka-u.ac.jp
Anubhab BaksiNanyang Technological University, SingaporeVerified email at e.ntu.edu.sg
Naofumi HommaTohoku UniversityVerified email at riec.tohoku.ac.jp
Sikhar PatranabisIBM Research IndiaVerified email at ibm.com
Laurent SauvageInstitut Mines-TélécomVerified email at telecom-paris.fr
Bernhard JungkAlbstadt-Sigmaringen UniversityVerified email at hs-albsig.de
Guillaume DucMaître de Conférences, Télécom ParisVerified email at telecom-paris.fr
Yu-ichi HAYASHINara Institute of Science and TechnologyVerified email at is.naist.jp
Olivier RioulProfesseur, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr