Get my own profile
Public access
View all31 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Bart BraemUniversity of Antwerp - imecVerified email at uantwerpen.be
Anthony Van HerrewegeKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
Roel PeetersnextAuthVerified email at nextauth.com
Nils Ole TippenhauerFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Aanjhan RanganathanAssistant ProfessorVerified email at northeastern.edu
Dries SchellekensCOSIC, KU Leuven, SeptentrioVerified email at esat.kuleuven.be
Frank StajanoProfessor of Security and Privacy, University of Cambridge Computer LabVerified email at cl.cam.ac.uk
Sofie PollinProfessor Electrical Engineering, KU LeuvenVerified email at esat.kuleuven.be