Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Sandeep S. KumarR&D Manager, Signify ResearchVerified email at signify.com
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Attila A YavuzAssociate Professor, University of South FloridaVerified email at usf.edu
- Shalabh JainResearch and Technology Center, Robert Bosch LLCVerified email at us.bosch.com
- Thang HoangVirginia TechVerified email at vt.edu
- Christopher HuthRobert Bosch GmbHVerified email at de.bosch.com
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Roel MaesSynopsysVerified email at synopsys.com
- Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityVerified email at cs.au.dk
- Zekeriya ErkinAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
- R. (Inald) L. LagendijkUniversity Professor of Computing-based Society, Computer Science, Delft University of TechnologyVerified email at tudelft.nl
- Paul DuplysRobert Bosch GmbHVerified email at de.bosch.com
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
- Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
- B SkoricTU EindhovenVerified email at tue.nl
- Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch