Get my own profile
Public access
View all20 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Serge VaudenayProfessor at EPFLVerified email at epfl.ch
- Aikaterini (Katerina) MitrokotsaProfessor, University of St. GallenVerified email at unisg.ch
- Alessio R LomuscioImperial College LondonVerified email at imperial.ac.uk
- David GERAULTTIIVerified email at tii.ae
- Pascal LafourcadeUniversité Clermont AuvergneVerified email at uca.fr
- Gildas AvoineINSA Rennes, IRISA, CNRSVerified email at irisa.fr
- Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
- Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
- Muhammed Ali BingolSenior Lecturer in Cyber Security at De Montfort UniversityVerified email at dmu.ac.uk
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Rolando Trujillo RasúaRamon i Cajal ResearcherVerified email at urv.cat
- Chong Hee KIMPrincipal SoC Security Assessor at NXPVerified email at nxp.com
- Süleyman KardaşAssist. Prof. at Batman UniversityVerified email at batman.edu.tr
- Dave SingeleeKatholieke Universiteit Leuven - COSICVerified email at esat.kuleuven.be
- Jorge MunillaProfessor of Telecommunication Engineering, University of MalagaVerified email at ic.uma.es
- Kasper RasmussenUniversity of OxfordVerified email at cs.ox.ac.uk
- Karthikeyan BhargavanINRIAVerified email at inria.fr
- Pierre-Alain FouqueProfessor of Computer Science, Rennes University, IRISA, Institut Universitaire de FranceVerified email at ens.fr
- Asli BAYAntalya Bilim UniversitesiVerified email at antalya.edu.tr
- Andrew V. JonesVector Software, Inc.Verified email at vectorcast.com