Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
Pascal BouvryProfessor of Computer Science, University of LuxembourgVerified email at uni.lu
Bernabe DorronsoroUniversity of CadizVerified email at uca.es
Matthias BrustUniversity of LuxembourgVerified email at ieee.org
Martin RosalieUniversité de Perpignan Via Domitia, LGDPVerified email at univ-perp.fr
Yoann PignéResearcher in computer science, University of Le Havre, FranceVerified email at univ-lehavre.fr
Patricia RuizAssistant Professor at University of CádizVerified email at uca.es
Julien SchleichUniversity of LuxembourgVerified email at uni.lu
El-ghazali TalbiUniversity of Lille 1, CNRS, INRIAVerified email at lifl.fr
Marcin SeredynskiE-Bus Competence Center, LuxembourgVerified email at list.lu
Johnatan E. PeceroChief Information Security OfficerVerified email at ext.uni.lu
Mateusz GuzekResearch Associate, University of LuxembourgVerified email at uni.lu
Anass NagihProfesseur d'Informatique, Université de LorraineVerified email at univ-lorraine.fr
Enrique AlbaProfessor of Computer Science, University of MálagaVerified email at lcc.uma.es
Björn OtterstenProfessor, SnT,University of Luxembourg, KTH Royal Institute of Technology, Stockholm, SwedenVerified email at uni.lu
Frederic GuinandProfessor of Computer Science, Le Havre University of NormandyVerified email at univ-lehavre.fr
Luc HogieCNRSVerified email at cnrs.fr
Samee U. KhanJames W. Bagley Chair Professor, Mississippi State UniversityVerified email at ece.msstate.edu
Antonio J. NebroUniversity of MálagaVerified email at lcc.uma.es
Sebastien VarretteResearch Scientist, University of LuxembourgVerified email at uni.lu
Juan Luis Jimenez LaredoAssociate professor University of Le Havre NormandyVerified email at univ-lehavre.fr
Grégoire Danoy
Verified email at uni.lu - Homepage