Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Giorgio Di NataleCNRS - TIMAVerified email at univ-grenoble-alpes.fr
- Jean Da RoltIFRSVerified email at bento.ifrs.edu.br
- Marie-Lise FlottesLIRMMVerified email at lirmm.fr
- Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USVerified email at intel.com
- Sandhya KoteshwaraIBM Research, University of MinnesotaVerified email at ibm.com
- Barıº EgeRiscure B.V.Verified email at riscure.com
- Keshab K. ParhiUniversity of Minnesota, Erwin A. Kelen Chair in Electrical EngineeringVerified email at umn.edu
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Stefaan SeysKU LeuvenVerified email at esat.kuleuven.be
- Sophie DupuisLIRMMVerified email at lirmm.fr
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Tolga YalcinQualcomm, San DiegoVerified email at qti.qualcomm.com
- Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at uni-passau.de
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
- Selçuk KöseUniversity of RochesterVerified email at ur.rochester.edu
- S. Karen KhatamifardPhD candidate of Electrical and Computer Engineering, University of MinnesotaVerified email at umn.edu
- Ulya R. KarpuzcuElectrical and Computer Engineering, University of Minnesota, Twin-CitiesVerified email at umn.edu
- Longfei WangQualcomm Technologies Inc.Verified email at qti.qualcomm.com