Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
Cas CremersProfessor of Computer Science, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Schmid LaraDFINITYVerified email at dfinity.org
S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
Kristian GjøsteenNTNUVerified email at ntnu.no
Rolando Trujillo RasúaSenior Lecturer at Deakin UniversityVerified email at deakin.edu.au
Ravi JhawarPwC LuxembourgVerified email at pwc.com
dr. ir. Pim VullersNXP SemiconductorsVerified email at vullersmail.nl
Michael SchläpferFortIT AG, ZurichVerified email at fort-it.ch
Petar TsankovSenior researcher, ETH ZurichVerified email at inf.ethz.ch
Karl WüstFaculty, CISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
ileana buhanRadboud UniversityVerified email at ru.nl
Laura CiobanuAssociate Professor, Heriot-Watt UniversityVerified email at hw.ac.uk
Marc PoulyProfessor in Computer Science, Lucerne University of Applied Sciences and ArtsVerified email at hslu.ch