Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at uni-passau.de
Christian RechbergerGraz University of TechnologyVerified email at tugraz.at
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Gregor LeanderRuhr University BochumVerified email at rub.de
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Anne CanteautInria Paris-Rocquencourt, FranceVerified email at inria.fr
Miroslav KnezevicNXP SemiconductorsVerified email at nxp.com
Lars Ramkilde KnudsenSDUVerified email at ramkildeknudsen.dk
Andrey BogdanovCEO/Founder at CYBERCRYPTVerified email at cyber-crypt.com
Martin R. AlbrechtKing's College LondonVerified email at kcl.ac.uk
Barış EgeRiscure B.V.Verified email at riscure.com
Martin M. LauridsenTechnical University of DenmarkVerified email at dtu.dk
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Neslin IsmailogluTÜBİTAK UZAYVerified email at tubitak.gov.tr
Giovanni BoeroEcole Polytechnique Fédérale de Lausanne (EPFL)Verified email at epfl.ch
Hristina Mihajloska TrpcheskaSs. Cyril and Methodius University, Faculty of Computer Science and EngineeringVerified email at finki.ukim.mk
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Amitabh DasAMD. Austin, Texas, USA & Intel Corporation, Hillsboro, Oregon, USA & COSIC/ESAT, KU Leuven, BelgiumVerified email at amd.com
Markus DürmuthProfessor for IT Security, Leibniz University HannoverVerified email at itsec.uni-hannover.de