Get my own profile
Public access
View all17 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Aleksandr OmetovPostdoctoral Research Fellow, Tampere UniversityVerified email at tuni.fi
Sergey AndreevTampere University, FinlandVerified email at tuni.fi
Jarmo HarjuTietoliikennetekniikan emeritusprofessori, Tampereen teknillinen yliopistoVerified email at tut.fi
Antonia Wachter-ZehAssociate Professor at Technical University of Munich (TUM)Verified email at tum.de
Mohammed Zaki AhmedPlymouth UniversityVerified email at plymouth.ac.uk
Danilo GligoroskiProfessor of Information Security and Cryptology, NTNUVerified email at item.ntnu.no
Simona SamardjiskaDigital Security Group, Radboud University, The Netherlands & Faculty of Computer Science andVerified email at finki.ukim.mk
Mubarak JibrilUniversity of plymouthVerified email at plymouth.ac.uk
Roman FloreaGoogleVerified email at google.com
Markus GrasslInternational Centre for Theory of Quantum Technologies (ICTQT) , University GdanskVerified email at ira.uka.de
Maximilien GadouleauAssociate Professor in Computer Science, Durham UniversityVerified email at durham.ac.uk
Jiri HosekBrno University of TechnologyVerified email at feec.vutbr.cz
Alla LevinaITMO UniversityVerified email at cit.ifmo.ru
Komosny DanBrno University of TechnologyVerified email at vut.cz
Kathiravelu GaneshanSenior Lecturer, Otago Polytechnic, Auckland International CampusVerified email at edenz.ac.nz
Miroslav VoznakTechnical University of OstravaVerified email at vsb.cz
Sergey AndreevNRC Institute of Immunology, MoscowVerified email at immune.umos.ru
Natalia VoloshinaITMO University
Follow
Bezzateev Sergey
Saint Petersburg State University of Aerospace Instrumentation, Department of Information Security
Verified email at aanet.ru