Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Gary T. LeavensProfessor, University of Central FloridaVerified email at cs.ucf.edu
- Joseph KiniryPrincipal Scientist, Galois and Principled CEO & Chief Scientist, Free & FairVerified email at acm.org
- Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
- Yoonsik CheonThe University of Texas at El PasoVerified email at utep.edu
- Joost VisserProfessor, LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
- Alex SerbanSiemens, UTBVVerified email at siemens.com
- Peter MüllerETH ZurichVerified email at inf.ethz.ch
- Wojciech MostowskiHalmstad UniversityVerified email at hh.se
- Tommy KoensRadboud universityVerified email at cs.ru.nl
- Engelbert HubbersLecturer Radboud UniversityVerified email at cs.ru.nl
- Aleksy SchubertUniversity of Warsaw, Faculty of Mathematics, Informatics and MechanicsVerified email at mimuw.edu.pl
- Barbara VieiraAWSVerified email at amazon.co.uk
- Michael D. ErnstProfessor of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
- Marieke HuismanVerified email at ewi.utwente.nl
- Daniel M. ZimmermanSenior Staff Research Scientist, CertiKVerified email at acm.org
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Fabian van den BroekAssistant professor Computer Science, Open University Netherlands & Guest Researcher RadboudVerified email at cs.ru.nl
- Michael MenthChair of Communication Networks, Department of Computer Science, University of TuebingenVerified email at uni-tuebingen.de
- Fides AartsASMLVerified email at asml.com