Get my own profile
Public access
View all52 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
xavier bultelLIMOS, Université Clermont AuvergneVerified email at irisa.fr
Jean-Guillaume DumasPr. Applied Mathematics, Université Grenoble AlpesVerified email at imag.fr
David GERAULTTIIVerified email at tii.ae
Stéphane DevismesProfessor at Université de Picardie Jules VerneVerified email at u-picardie.fr
Takaaki MizukiTohoku UniversityVerified email at cc.tohoku.ac.jp
Ali KassemR&D at Ecole PolytechniqueVerified email at polytechnique.edu
Daiki MiyaharaThe University of Electro-CommunicationsVerified email at dc.tohoku.ac.jp
Radu CiucanuINSA Centre Val de LoireVerified email at insa-cvl.fr
Karine AltisenMaître de Conférences, Grenoble INP / VerimagVerified email at imag.fr
Stéphanie DelauneUniv Rennes, CNRS, IRISAVerified email at irisa.fr
Maxime PuysCEA-TechVerified email at cea.fr
Marius Lombard-PlatetEcole normale supérieureVerified email at ens.fr
Véronique CortierCNRS, LORIAVerified email at loria.fr
quentin BRAMASUniversité de StrasbourgVerified email at unistra.fr
Hugo JonkerOpen UniversiteitVerified email at ou.nl
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
nassira ghoualmi zineuniversité Badji Mokhtar, network and systems laboratoryVerified email at lrs-annaba.net
Sébastien GambsUniversité du Québec à Montréal (UQAM)Verified email at uqam.ca
Atsuki NagaoLecturer, Ochanomizu UniversityVerified email at is.ocha.ac.jp