Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gary T. LeavensProfessor, University of Central FloridaVerified email at cs.ucf.edu
Joseph KiniryPrincipal Scientist, Galois and Principled CEO & Chief Scientist, Free & FairVerified email at acm.org
Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
Yoonsik CheonThe University of Texas at El PasoVerified email at utep.edu
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Joost VisserProfessor, LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Wojciech MostowskiHalmstad UniversityVerified email at hh.se
Peter MüllerETH ZurichVerified email at inf.ethz.ch
Alex SerbanSiemens Healthineers, UTBVVerified email at siemens.com
Tommy KoensRadboud universityVerified email at cs.ru.nl
Engelbert HubbersLecturer Radboud UniversityVerified email at cs.ru.nl
Daniel M. ZimmermanSenior Staff Research Scientist, CertiKVerified email at acm.org
Marieke HuismanVerified email at ewi.utwente.nl
Aleksy SchubertUniversity of Warsaw, Faculty of Mathematics, Informatics and MechanicsVerified email at mimuw.edu.pl
Barbara VieiraVerified email at tomtom.com
Michael D. ErnstProfessor of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
Michael MenthChair of Communication Networks, Department of Computer Science, University of TuebingenVerified email at uni-tuebingen.de
Frits W. VaandragerProfessor of Computer Science, Radboud UniversityVerified email at cs.ru.nl
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Fabian van den BroekAssistant professor Computer Science, Open University Netherlands & Guest Researcher RadboudVerified email at cs.ru.nl