Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Zhengyu ZhaoXi'an Jiaotong University, ChinaVerified email at xjtu.edu.cn
- Martha LarsonRadboud UniversityVerified email at ru.nl
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Niels SamwelRadboud UniversityVerified email at cs.ru.nl
- Weissbart LéoPhD candidateVerified email at cs.ru.nl
- Rui WenCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Tianhao WangUniversity of VirginiaVerified email at virginia.edu
- Tom HeskesProfessor of Computer Science and Artificial Intelligence, Radboud University NijmegenVerified email at science.ru.nl
- Twan van LaarhovenRadboud University NijmegenVerified email at cs.ru.nl
- Mingliang LiangRadboud UniversityVerified email at cs.ru.nl
- Nik VaessenPhD candidateVerified email at ru.nl
- Veelasha MoonsamyProfessor at Ruhr University Bochum, GermanyVerified email at veelasha.org
- Hamid BostaniPhD Candidate in the Digital Security Group, Radboud University, The NetherlandsVerified email at ru.nl
- Xiaoyun XuRadboud UniversityVerified email at ru.nl
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
- Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- ileana buhanRadboud UniversityVerified email at ru.nl