Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Sjouke MauwProfessor in Security and Trust of Software Systems, University of LuxembourgVerified email at uni.lu
David BasinProfessor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Ralf SasseSenior Scientist in Computer Science, ETH ZurichVerified email at inf.ethz.ch
Jannik DreierLORIA, Université de Lorraine, TELECOM NancyVerified email at loria.fr
Lucca HirschiTenured Inria Researcher @ LoriaVerified email at inria.fr
Schmid LaraDFINITYVerified email at dfinity.org
Cas CremersCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
S. F. MjølsnesProfessor at NTNUVerified email at item.ntnu.no
Kristian GjøsteenNTNUVerified email at ntnu.no
Rolando Trujillo RasúaRamon i Cajal ResearcherVerified email at urv.cat
Ravi JhawarPwC LuxembourgVerified email at pwc.com
dr. ir. Pim VullersNXP SemiconductorsVerified email at vullersmail.nl
Michael SchläpferFortIT AG, ZurichVerified email at fort-it.ch
Petar TsankovCo-founder & CEO, LatticeFlowVerified email at latticeflow.ai
Karl WüstMysten LabsVerified email at mystenlabs.com
Peter RyanProfessor of applied security, university of luxembourgVerified email at uni.lu
Gabriele LenziniInterdiscilplinary Centre for Security Reliability and Trust ( SNT) - University of LuxembourgVerified email at uni.lu
ileana buhanRadboud UniversityVerified email at ru.nl
Marc PoulyProfessor in Computer Science, Lucerne University of Applied Sciences and ArtsVerified email at hslu.ch
Hugo JonkerOpen UniversiteitVerified email at ou.nl