Get my own profile
Public access
View all24 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
- Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
- Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
- Marco CaselliSiemens AGVerified email at siemens.com
- Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
- Erik TewsUniversity of TwenteVerified email at utwente.nl
- R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
- Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
- Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
- Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
- Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
- Hoon Wei LimSingtelVerified email at singtel.com
- Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
- Bram Leendersstudent Distributed Systems and Services, KTH Royal Institute of TechnologyVerified email at kth.se
- Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
- Rick HofstedeUniversity of TwenteVerified email at utwente.nl
- Bogdan CarbunarFlorida International UniversityVerified email at cs.fiu.edu
- Peter T WilliamsVerified email at google.com
- Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nl
- Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com