Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Giorgio Di NataleCNRS - TIMAVerified email at univ-grenoble-alpes.fr
- Jean Da RoltIFRSVerified email at bento.ifrs.edu.br
- Marie-Lise FlottesLIRMMVerified email at lirmm.fr
- Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USVerified email at intel.com
- Sandhya KoteshwaraIBM Research, University of MinnesotaVerified email at ibm.com
- Barış EgeRiscure B.V.Verified email at riscure.com
- Keshab K. ParhiUniversity of Minnesota, Erwin A. Kelen Chair in Electrical EngineeringVerified email at umn.edu
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Stefaan SeysKU LeuvenVerified email at esat.kuleuven.be
- Sophie DupuisLIRMM (Université de Montpellier, CNRS)Verified email at lirmm.fr
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Tolga YalcinQualcomm, San DiegoVerified email at qti.qualcomm.com
- Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at uni-passau.de
- Selçuk KöseProfessor of Electrical and Computer Engineering, University of RochesterVerified email at rochester.edu
- S. Karen KhatamifardPhD candidate of Electrical and Computer Engineering, University of MinnesotaVerified email at umn.edu
- Ulya R. KarpuzcuElectrical and Computer Engineering, University of Minnesota, Twin-CitiesVerified email at umn.edu
- Longfei WangQualcomm Technologies Inc.Verified email at qti.qualcomm.com
- Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de