Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ivan ViscontiSapienza University of RomeVerified email at uniroma1.it
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Roel MaesSynopsysVerified email at synopsys.com
Yossi OrenAssociate Professor at Ben-Gurion UniversityVerified email at bgu.ac.il
Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
Anthony Van HerrewegeKU Leuven - ESAT/COSICVerified email at esat.kuleuven.be
Roel PeetersnextAuthVerified email at nextauth.com
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Farinaz KoushanfarProfessor and Siavouche Nemat-Nasser Endowed Chair of ECE, UC San DiegoVerified email at ucsd.edu
Joonho KongAssociate Professor, School of Electronics Engineering, Kyungpook National UniversityVerified email at knu.ac.kr
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
Ahmed TahaIU AS