Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
- David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
- Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
- Schmid LaraDFINITYVerified email at dfinity.org
- Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
- Kristian GjøsteenNTNUVerified email at ntnu.no
- Rolando Trujillo RasúaRamon i Cajal ResearcherVerified email at urv.cat
- Ravi JhawarPwC LuxembourgVerified email at pwc.com
- dr. ir. Pim VullersNXP SemiconductorsVerified email at vullersmail.nl
- Michael SchläpferFortIT AG, ZurichVerified email at fort-it.ch
- Petar TsankovCo-founder & CEO, LatticeFlowVerified email at latticeflow.ai
- Karl WüstMysten LabsVerified email at mystenlabs.com
- Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
- Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
- ileana buhanRadboud UniversityVerified email at ru.nl
- Marc PoulyProfessor in Computer Science, Lucerne University of Applied Sciences and ArtsVerified email at hslu.ch
- Hugo JonkerOpen UniversiteitVerified email at ou.nl