Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Konstantinos MarkantonakisProfessor of Information SecurityVerified email at rhul.ac.uk
- Raja Naeem AkramDepartment of Computer Science, University of AberdeenVerified email at abdn.ac.uk
- Keith MayesRoyal Holloway, University of LondonVerified email at rhul.ac.uk
- Emmanuel ConchonAssistant professor, University of Limoges, XLIMVerified email at unilim.fr
- ryma abassiSupcomVerified email at supcom.tn
- Stephanie SAHUGUEDEMCF, University of Limoges, FRANCEVerified email at ensil.unilim.fr
- Anne JULIEN-VERGONJANNEProfesseur, Université de LimogesVerified email at ensil.unilim.fr
- Hana RhimDigital Security Lab, Sup'Com, University of Carthage, TunisiaVerified email at supcom.tn
- Pierre COMBEAUAssociate Professor, XLIM Laboratory, FranceVerified email at univ-poitiers.fr
- Pierre VignerasAmazon Web ServicesVerified email at amazon.com
- Lilian AveneauProfessor in Computer Science, Institute XLIM, Université de Poitiers, FranceVerified email at univ-poitiers.fr
- Michael TunstallCryptography ResearchVerified email at cryptography.com
- oussama habachixlimVerified email at xlim.fr
- Olivier BlazyEcole PolytechniqueVerified email at polytechnique.edu
- Pierre DusartUniversité de LimogesVerified email at unilim.fr
- malika belkadiUniversité Mouloud Mammeri de Tizi OuzouVerified email at ummto.dz
- David NaccacheENS (Equipe Securité) & visiting RHUL (ISG)Verified email at ens.fr
- Iakovos GurulianTEKA Systems S.A.Verified email at tekasystems.com
- Carlton ShepherdNewcastle University, UKVerified email at ncl.ac.uk
- Aida Ben Chehida DoussENITVerified email at enit.utm.tn
Follow
Damien Sauveron
Professor in Computer Science, University of Limoges
Verified email at unilim.fr - Homepage