Get my own profile
Public access
View all40 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Carmela TroncosoEPFLVerified email at epfl.ch
Gunes AcarAssistant Professor at Radboud UniversityVerified email at cs.ru.nl
Marc JuarezAssistant Professor, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Stefaan SeysKU LeuvenVerified email at esat.kuleuven.be
Ero BalsaCornell TechVerified email at cornell.edu
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Rafa Gálvez VizcaínoKU LeuvenVerified email at kuleuven.be
Rachel GreenstadtComputer Science and Engineering Department, New York UniversityVerified email at nyu.edu
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Steven EnglehardtDuckDuckGoVerified email at princeton.edu
Mohsen ImaniAnomali Inc.Verified email at mavs.uta.edu
Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Sadia AfrozAvast, ICSIVerified email at icsi.berkeley.edu
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Jean-Pierre HubauxProfessor, EPFLVerified email at epfl.ch