Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Konstantinos MarkantonakisProfessor of Information SecurityVerified email at rhul.ac.uk
Raja Naeem AkramDepartment of Computer Science, University of AberdeenVerified email at abdn.ac.uk
Keith MayesRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Emmanuel ConchonAssistant professor, University of Limoges, XLIMVerified email at unilim.fr
ryma abassiSupcomVerified email at supcom.tn
Pierre VignerasAmazon Web ServicesVerified email at amazon.com
Michael TunstallCryptography ResearchVerified email at cryptography.com
oussama habachixlimVerified email at xlim.fr
Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
Iakovos GurulianTEKA Systems S.A.Verified email at teka.vionet.gr
Carlton ShepherdRoyal Holloway, University of LondonVerified email at rhul.ac.uk
David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
Ioannis AskoxylakisEuropean CommissionVerified email at ec.europa.eu
Pierangela SamaratiUniversita` degli Studi di MilanoVerified email at unimi.it
BELKACEM ImadLaboratoire d'Informatique et de Technologie de l'Information d'Oran (LITIO)- Université Oran 1Verified email at univ-mosta.dz
Theo TryfonasUniversity of BristolVerified email at bristol.ac.uk
Apostolos TraganitisDept. of Computer Science, Univ. of Crete, Greece.Verified email at ics.forth.gr
Maryline LaurentTelecom SudParisVerified email at telecom-sudparis.eu
Quisquater Jean-JacquesUCL Crypto Group, professor em. of cryptography, securityVerified email at uclouvain.be
Seungmin RhoDepartment of Industrial Security, Chung-Ang University, KoreaVerified email at cau.ac.kr
Follow
Damien Sauveron
Associate Professor with Habilitation in Computer Science, University of Limoges
Verified email at unilim.fr - Homepage