Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
- Gerhard de Koning GansFactorIT BVVerified email at factorit.nl
- Peter van RossumVerified email at cs.ru.nl
- Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl
- Josep BalaschKU LeuvenVerified email at kuleuven.be
- Barış EgeRiscure B.V.Verified email at riscure.com
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
- Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
- Erik PollRadboud University NijmegenVerified email at cs.ru.nl
- Fabian van den BroekAssistant professor Computer Science, Open University Netherlands & Guest Researcher RadboudVerified email at cs.ru.nl
- Milosch MeriacTechnology Innovation InstitueVerified email at meriac.com
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
- Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
- Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
- Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
- Lucian CojocarIntelVerified email at intel.com
- Greg AlparEducation Innovator (Radboud University, The Netherlands)Verified email at ru.nl