Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Aleksandr OmetovTampere University, Senior Research FellowVerified email at tuni.fi
- Natalia VoloshinaITMO UniversityVerified email at itmo.ru
- Sergey AndreevTampere University, FinlandVerified email at tuni.fi
- Jarmo HarjuTietoliikennetekniikan emeritusprofessori, Tampereen teknillinen yliopistoVerified email at tut.fi
- Antonia Wachter-ZehAssociate Professor at Technical University of Munich (TUM)Verified email at tum.de
- Mohammed Zaki AhmedPlymouth UniversityVerified email at plymouth.ac.uk
- Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
- Simona SamardjiskaDigital Security Group, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Mubarak JibrilUniversity of plymouthVerified email at plymouth.ac.uk
- Roman FloreaGoogleVerified email at google.com
- Markus GrasslInternational Centre for Theory of Quantum Technologies (ICTQT) , University GdanskVerified email at ug.edu.pl
- Maximilien GadouleauAssociate Professor in Computer Science, Durham UniversityVerified email at durham.ac.uk
- Jiri HosekBrno University of TechnologyVerified email at feec.vutbr.cz
- Alla LevinaITMO UniversityVerified email at cit.ifmo.ru
- Komosny DanBrno University of TechnologyVerified email at vut.cz
- Kathiravelu GaneshanSenior Lecturer, Otago Polytechnic, Auckland International CampusVerified email at edenz.ac.nz
- Miroslav VoznakTechnical University of OstravaVerified email at vsb.cz
- Sergey AndreevNRC Institute of Immunology, MoscowVerified email at immune.umos.ru
- Yevgeni KoucheryavyTampere University of Technology
Follow
Bezzateev Sergey
Saint Petersburg State University of Aerospace Instrumentation, Department of Information Security
Verified email at aanet.ru