Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Gerhard de Koning GansFactorIT BVVerified email at factorit.nl
Peter van RossumVerified email at cs.ru.nl
Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl
Josep BalaschKU LeuvenVerified email at kuleuven.be
Barış EgeRiscure B.V.Verified email at riscure.com
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Joeri de RuiterSpecialist security and privacy at SURFVerified email at surf.nl
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Marko van EekelenOpen Universiteit Nederland & Radboud UniversiteitVerified email at cs.ru.nl
Erik PollRadboud University NijmegenVerified email at cs.ru.nl
Fabian van den BroekAssistant professor Computer Science, Open University Netherlands & Guest Researcher RadboudVerified email at cs.ru.nl
Milosch MeriacTechnology Innovation InstitueVerified email at meriac.com
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Benedikt GierlichsResearch Expert at KU Leuven/COSICVerified email at esat.kuleuven.be
Davide BalzarottiProfessor, EurecomVerified email at eurecom.fr
Herbert BosVrije Universiteit AmsterdamVerified email at cs.vu.nl
Aurélien FrancillonProfessor, EURECOMVerified email at eurecom.fr
Lucian CojocarIntelVerified email at intel.com
Greg AlparEducation Innovator (Radboud University, The Netherlands)Verified email at ru.nl