Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ivan ViscontiUniversity of Salerno, ITALYVerified email at unisa.it
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Roel MaesIntrinsic IDVerified email at intrinsic-id.com
Yossi OrenAssociate Professor at Ben-Gurion UniversityVerified email at bgu.ac.il
Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainVerified email at uclouvain.be
Anthony Van HerrewegeKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
Roel PeetersnextAuthVerified email at nextauth.com
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
Farinaz KoushanfarProfessor and Henry Booker Faculty Scholar of ECE, UC San DiegoVerified email at ucsd.edu
Joonho KongAssociate Professor, School of Electronics Engineering, Kyungpook National UniversityVerified email at knu.ac.kr
Ahmed TahaSTRDVerified email at strd-eg.com