Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Zhengyu ZhaoXi'an Jiaotong University, ChinaVerified email at xjtu.edu.cn
Martha LarsonRadboud UniversityVerified email at ru.nl
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Niels SamwelRadboud UniversityVerified email at cs.ru.nl
Weissbart LéoPhD candidateVerified email at cs.ru.nl
Rui WenCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Tianhao WangUniversity of VirginiaVerified email at virginia.edu
Tom HeskesProfessor of Computer Science and Artificial Intelligence, Radboud University NijmegenVerified email at science.ru.nl
Twan van LaarhovenRadboud University NijmegenVerified email at cs.ru.nl
Veelasha MoonsamyProfessor at Ruhr University Bochum, GermanyVerified email at veelasha.org
Hamid BostaniPhD Candidate in the Digital Security Group, Radboud University, The NetherlandsVerified email at ru.nl
Yang ZhangFaculty at CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Xiaoyun XuRadboud UniversityVerified email at ru.nl
Stjepan PicekAssociate professor, Radboud University, The NetherlandsVerified email at computer.org
ileana buhanRadboud UniversityVerified email at ru.nl