Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sandeep S. KumarR&D Manager, Signify ResearchVerified email at signify.com
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Attila A YavuzAssociate Professor, University of South FloridaVerified email at usf.edu
Shalabh JainResearch and Technology Center, Robert Bosch LLCVerified email at us.bosch.com
Thang HoangVirginia TechVerified email at vt.edu
Christopher HuthRobert Bosch GmbHVerified email at de.bosch.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Roel MaesSynopsysVerified email at synopsys.com
Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityVerified email at cs.au.dk
Zekeriya ErkinAssociate Professor, Delft University of TechnologyVerified email at tudelft.nl
R. (Inald) L. LagendijkUniversity Professor of Computing-based Society, Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Paul DuplysRobert Bosch GmbHVerified email at de.bosch.com
Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
B SkoricTU EindhovenVerified email at tue.nl
Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowVerified email at inf.ethz.ch