Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Giorgio Di NataleCNRS - TIMAVerified email at univ-grenoble-alpes.fr
Jean Da RoltIFRSVerified email at bento.ifrs.edu.br
Marie-Lise FlottesLIRMMVerified email at lirmm.fr
Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USVerified email at intel.com
Sandhya KoteshwaraIBM Research, University of MinnesotaVerified email at ibm.com
Barış EgeRiscure B.V.Verified email at riscure.com
Keshab K. ParhiUniversity of Minnesota, Erwin A. Kelen Chair in Electrical EngineeringVerified email at umn.edu
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Stefaan SeysKU LeuvenVerified email at esat.kuleuven.be
Sophie DupuisLIRMM (Université de Montpellier, CNRS)Verified email at lirmm.fr
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Tolga YalcinQualcomm, San DiegoVerified email at qti.qualcomm.com
Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at uni-passau.de
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
S AftabjahaniIntel CorporationVerified email at intel.com
Selçuk KöseUniversity of RochesterVerified email at ur.rochester.edu
S. Karen KhatamifardPhD candidate of Electrical and Computer Engineering, University of MinnesotaVerified email at umn.edu
Ulya R. KarpuzcuElectrical and Computer Engineering, University of Minnesota, Twin-CitiesVerified email at umn.edu