Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Erik PollRadboud University NijmegenVerified email at cs.ru.nl
Reiner HähnleProfessor of Computer Science, Technical University of DarmstadtVerified email at cs.tu-darmstadt.de
Wolfgang AhrendtProfessor of Computer Science, Chalmers University of TechnologyVerified email at chalmers.se
Richard BubelDepartment of Computer Science, TU DarmstadtVerified email at cs.tu-darmstadt.de
Marieke HuismanVerified email at ewi.utwente.nl
Andreas RothSAP SEVerified email at sap.com
dr. ir. Pim VullersNXP SemiconductorsVerified email at vullersmail.nl
Vladimir KlebanovSAP SE (previously at Karlsruhe Institute of Technology)Verified email at sap.com
Rosemary MonahanNational Univeristy of IrelandVerified email at mu.ie
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Radu GrigoreMetaVerified email at fb.com
Dino DistefanoAnthropic and Queen Mary University of LondonVerified email at eecs.qmul.ac.uk
Marc BrockschmidtResearch Scientist, Google DeepMindVerified email at google.com
Jean-Christophe FilliâtreCNRSVerified email at lri.fr
Stefan BlomUniversity of TwenteVerified email at utwente.nl
Jaap-Henk HoepmanAssociate Professor of Computer Science, Radboud University NijmegenVerified email at cs.ru.nl
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Jan TretmansResearch Fellow, ESI (TNO), Eindhoven; and Assoc. Prof., Radboud University, NijmegenVerified email at cs.ru.nl
Julien SchmaltzCGIVerified email at cgi.com
Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl