Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Erik PollRadboud University NijmegenVerified email at cs.ru.nl
- Reiner HähnleProfessor of Computer Science, Technical University of DarmstadtVerified email at cs.tu-darmstadt.de
- Wolfgang AhrendtProfessor of Computer Science, Chalmers University of TechnologyVerified email at chalmers.se
- Richard BubelDepartment of Computer Science, TU DarmstadtVerified email at cs.tu-darmstadt.de
- Marieke HuismanVerified email at ewi.utwente.nl
- Andreas RothSAP SEVerified email at sap.com
- dr. ir. Pim VullersNXP SemiconductorsVerified email at vullersmail.nl
- Vladimir KlebanovSAP SE (previously at Karlsruhe Institute of Technology)Verified email at sap.com
- Rosemary MonahanNational Univeristy of IrelandVerified email at mu.ie
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Radu GrigoreFacebookVerified email at fb.com
- Dino DistefanoMeta and Queen Mary University of LondonVerified email at eecs.qmul.ac.uk
- Marc BrockschmidtResearch Scientist, Google DeepMindVerified email at google.com
- Jean-Christophe FilliâtreCNRSVerified email at lri.fr
- Stefan BlomUniversity of TwenteVerified email at utwente.nl
- Jaap-Henk HoepmanAssociate Professor of Computer Science, Radboud University NijmegenVerified email at cs.ru.nl
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
- Jan TretmansResearch Fellow, ESI (TNO), Eindhoven; and Assoc. Prof., Radboud University, NijmegenVerified email at cs.ru.nl
- Julien SchmaltzCGIVerified email at cgi.com
- Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl