Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sandeep S. KumarR&D Manager, Signify ResearchEmail verificata su signify.com
- Christof PaarMax Planck Institute for Security and Privacy, BochumEmail verificata su rub.de
- Attila A YavuzAssociate Professor, University of South FloridaEmail verificata su usf.edu
- Shalabh JainResearch and Technology Center, Robert Bosch LLCEmail verificata su us.bosch.com
- Thang HoangVirginia TechEmail verificata su vt.edu
- Christopher HuthRobert Bosch GmbHEmail verificata su de.bosch.com
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsEmail verificata su cs.ru.nl
- Ingrid VerbauwhedeKU LeuvenEmail verificata su esat.kuleuven.be
- Roel MaesIntrinsic IDEmail verificata su intrinsic-id.com
- Tomas ToftPostDoc, Computer Science Dept., Aarhus UniversityEmail verificata su cs.au.dk
- Zekeriya ErkinAssociate Professor, Delft University of TechnologyEmail verificata su tudelft.nl
- R. (Inald) L. LagendijkUniversity Professor of Computing-based Society, Computer Science, Delft University of TechnologyEmail verificata su tudelft.nl
- Paul DuplysRobert Bosch GmbHEmail verificata su de.bosch.com
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumEmail verificata su rub.de
- Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauEmail verificata su uni-passau.de
- Nele MentensLeiden University and KU LeuvenEmail verificata su esat.kuleuven.be
- Bart MenninkDigital Security Group, Radboud University, NijmegenEmail verificata su cs.ru.nl
- B SkoricTU EindhovenEmail verificata su tue.nl
- Ahmad-Reza SadeghiTechnische Universität DarmstadtEmail verificata su trust.tu-darmstadt.de
- Adrian PerrigProfessor of Computer Science at ETH Zürich, Adjunct Professor of ECE at CMU, Cylab FellowEmail verificata su inf.ethz.ch
Segui