Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Wolfgang AhrendtProfessor of Computer Science, Chalmers University of TechnologyVerified email at chalmers.se
Erik PollRadboud University NijmegenVerified email at cs.ru.nl
Reiner HähnleProfessor of Computer Science, Technical University of DarmstadtVerified email at cs.tu-darmstadt.de
Richard BubelDepartment of Computer Science, TU DarmstadtVerified email at cs.tu-darmstadt.de
Marieke HuismanVerified email at ewi.utwente.nl
Andreas RothSAP SEVerified email at sap.com
dr. ir. Pim VullersNXP SemiconductorsVerified email at vullersmail.nl
Vladimir KlebanovSAP SE (previously at Karlsruhe Institute of Technology)Verified email at sap.com
Rosemary MonahanNational Univeristy of IrelandVerified email at mu.ie
Dino DistefanoFacebook and Queen Mary University of LondonVerified email at eecs.qmul.ac.uk
Jean-Christophe FilliâtreCNRSVerified email at lri.fr
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Stefan BlomUniversity of TwenteVerified email at utwente.nl
Radu GrigoreFacebookVerified email at fb.com
Marc BrockschmidtResearch Scientist, Google ResearchVerified email at google.com
Jaap-Henk HoepmanAssociate Professor of Computer Science, Radboud University Nijmegen and Associate Professor, IT LawVerified email at cs.ru.nl
Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
Jan TretmansResearch Fellow, ESI (TNO), Eindhoven; and Assoc. Prof., Radboud University, NijmegenVerified email at cs.ru.nl
Julien SchmaltzCGIVerified email at cgi.com
Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl