Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gary T. LeavensProfessor, University of Central FloridaVerified email at cs.ucf.edu
Joseph KiniryPrincipal Scientist, Galois and Principled CEO & Chief Scientist, Free & FairVerified email at acm.org
Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Yoonsik CheonThe University of Texas at El PasoVerified email at utep.edu
Joost VisserProfessor, LIACS, Leiden UniversityVerified email at liacs.leidenuniv.nl
Alex SerbanSiemens, UTBVVerified email at siemens.com
Peter MüllerETH ZurichVerified email at inf.ethz.ch
Wojciech MostowskiHalmstad UniversityVerified email at hh.se
Tommy KoensRadboud universityVerified email at cs.ru.nl
Michael D. ErnstProfessor of Computer Science & Engineering, University of WashingtonVerified email at cs.washington.edu
Engelbert HubbersLecturer Radboud UniversityVerified email at cs.ru.nl
Aleksy SchubertUniversity of Warsaw, Faculty of Mathematics, Informatics and MechanicsVerified email at mimuw.edu.pl
Barbara VieiraAWSVerified email at amazon.co.uk
Marieke HuismanVerified email at ewi.utwente.nl
Daniel M. ZimmermanSenior Staff Research Scientist, CertiKVerified email at acm.org
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Fabian van den BroekAssistant professor Computer Science, Open University Netherlands & Guest Researcher RadboudVerified email at cs.ru.nl
Michael MenthChair of Communication Networks, Department of Computer Science, University of TuebingenVerified email at uni-tuebingen.de
Fides AartsASMLVerified email at asml.com