Get my own profile
Public access
View all62 articles
58 articles
available
not available
Based on funding mandates
Co-authors
Hwajeong SeoProfessor, Hansung University, South KoreaVerified email at hansung.ac.kr
Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
Jongseok ChoiPusan National UniversityVerified email at pusan.ac.kr
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Sujoy Sinha RoyAssociate Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
Patrick LongaPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
Kimmo JärvinenXiphera Ltd.Verified email at xiphera.com
Geovandro PereiraSecurity Engineer, LG Electronics, USAVerified email at uwaterloo.ca
Reza AzarderakhshProfessor at FAU and Founder of PQSecureVerified email at fau.edu
Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa
Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
Praveen Kumar VadnalaRiscureVerified email at riscure.com
Srinivas VivekInternational Institute of Information Technology, BangaloreVerified email at iiitb.ac.in
David GalindoCTO, Valory AGVerified email at valory.xyz
Erich WengerInfineon TechnologiesVerified email at infineon.com
Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
Ilya KizhvatovBioNTech SEVerified email at biontech.de
Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.de