Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- R.N.J. VeldhuisFull professor, University of TwenteEmail verificata su utwente.nl
- Pieter HartelProfessor Emeritus Cyber securityEmail verificata su tudelft.nl
- Jeroen DoumenSandGrain B.V.Email verificata su doumen.nl
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Stjepan PicekAssociate professor, Radboud University, The NetherlandsEmail verificata su computer.org
- Guilherme PerinLeiden UniversityEmail verificata su tudelft.nl
- Jorge GuajardoRobert Bosch LLC - Research and Technology CenterEmail verificata su us.bosch.com
- Christoph BuschProfessor for Biometrics, Norwegian University of Science and Technology (NTNU)Email verificata su ntnu.no
- Bian YangNTNUEmail verificata su ntnu.no
- Patrick SchaumontWorcester Polytechnic InstituteEmail verificata su wpi.edu
- Yuval YaromRuhr University BochumEmail verificata su rub.de
- Elisabeth OswaldProfessor in Cybersecurity at Univ. of Klagenfurt, and Applied Cryptography at Univ. of BirminghamEmail verificata su aau.at
- Carolyn WhitnallUniversity of BristolEmail verificata su bris.ac.uk
- Christophe GiraudCryptography and Product Security Group Manager at IDEMIAEmail verificata su idemia.com
- Davide BelliziaPostDoc Researcher @ UCL Crypto GroupEmail verificata su uclouvain.be
- François KoeuneUCL Crypto GroupEmail verificata su uclouvain.be
- Francois-Xavier StandaertSenior Associate Researcher (FNRS-F.R.S), Université catholique de LouvainEmail verificata su uclouvain.be
- Sébastien DuvalUniversité de VersaillesEmail verificata su uvsq.fr
- BJ BoomUniversity of Twente, University of EdinburghEmail verificata su imec.nl
- Koen SimoensEmail verificata su simi.be