Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
R. (Inald) L. LagendijkUniversity Professor of Computing-based Society, Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Thijs VeugenTNO and Centrum Wiskunde & InformaticaVerified email at tno.nl
Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityVerified email at cs.au.dk
Mauro BarniProfessor, University of SienaVerified email at dii.unisi.it
Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Alessandro PivaDepartment of Information Engineering, University of FlorenceVerified email at unifi.it
Gregory NevenDFINITYVerified email at dfinity.org
Fernando Pérez-GonzálezProfessor, atlanTTic Research Center, University of Vigo - SpainVerified email at gts.uvigo.es
Gene TsudikPeter & Lois Griffin Professor, Jolly Good Fellow of This & ThatVerified email at ics.uci.edu
Johan PouwelseAssociate Professor of Computer Science, Delft University of TechnologyVerified email at tudelft.nl
Timo GerkmannProfessor of Signal Processing, University of Hamburg, GermanyVerified email at uni-hamburg.de
Richard HendriksAssociate professor Delft University of TechnologyVerified email at tudelft.nl
William PuechFull Professor - LIRMM - Univ. Montpellier - CNRSVerified email at lirmm.fr
Shantanu RaneResearch Area Manager, Cyber-Physical Systems Security, Xerox PARC.Verified email at parc.com
Robert SeepersPhD Student Erasmus MCVerified email at erasmusmc.nl
Arnold P.O.S. VermeerenDelft University of TechnologyVerified email at tudelft.nl
Jie LiCentrum Wiskunde & InformaticaVerified email at cwi.nl
huib de ridderDelft University of Technology, Delft, The NetherlandsVerified email at tudelft.nl
Zekeriya Erkin
Verified email at tudelft.nl - Homepage