Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Roel VerdultFactorIT BVVerified email at factorit.nl
Peter van RossumVerified email at cs.ru.nl
Gerhard de Koning GansFactorIT BVVerified email at factorit.nl
David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Jaap-Henk HoepmanAssociate Professor of Computer Science, Radboud University NijmegenVerified email at cs.ru.nl
Eduard MarinSenior Research Scientist at Telefonica ResearchVerified email at telefonica.com
Jan Van den HerrewegenIndependent researcherVerified email at embercrypt.com
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Sam L. ThomasChief Scientist, BINARLY, Inc.Verified email at binarly.io
Andreea-Ina RaduDoctoral Researcher, University of BirminghamVerified email at birmingham.ac.uk
Eric VerheulPart-time Professor Financial Information Security, Radboud University NijmegenVerified email at cs.ru.nl
David GalindoCTO, Valory AGVerified email at valory.xyz
Zitai ChenUniversity of BirminghamVerified email at pgr.bham.ac.uk
Abdulla AldoseriPhD Student, University of BirminghamVerified email at student.bham.ac.uk
Barış EgeRiscure B.V.Verified email at riscure.com
Follow
Flavio D. Garcia
Professor of Computer Security, University of Birmingham
Verified email at bham.ac.uk - Homepage