Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Jeroen DoumenSandGrain B.V.Verified email at doumen.nl
Jorge GuajardoRobert Bosch LLC - Research and Technology CenterVerified email at us.bosch.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Stjepan PicekRadboud University, The NetherlandsVerified email at computer.org
Guilherme PerinTU Delft UniversityVerified email at tudelft.nl
Christoph BuschProfessor for Biometrics, Norwegian University of Science and Technology (NTNU)Verified email at ntnu.no
Bian YangNTNUVerified email at ntnu.no
BJ BoomUniversity of Twente, University of EdinburghVerified email at inf.ed.ac.uk
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Koen SimoensVerified email at simi.be
Elisabeth OswaldProfessor in Cybersecurity at Alpen-Adria Universität KlagenfurtVerified email at aau.at
Carolyn WhitnallUniversity of BristolVerified email at bris.ac.uk
Christophe GiraudCryptography and Product Security Group Manager at IDEMIAVerified email at idemia.com
Davide BelliziaPostDoc Researcher @ UCL Crypto GroupVerified email at uclouvain.be
François KoeuneUCL Crypto GroupVerified email at uclouvain.be
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Sébastien DuvalUniversité de VersaillesVerified email at uvsq.fr
Patrick SchaumontWorcester Polytechnic InstituteVerified email at wpi.edu