Get my own profile
Public access
View all59 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Domagoj JakobovićUniversity of Zagreb Faculty of electrical engineering and computingVerified email at fer.unizg.hr
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Guilherme PerinLeiden UniversityVerified email at tudelft.nl
Lichao WuTechnische Universität DarmstadtVerified email at tu-darmstadt.de
Annelie HeuserCNRS researcherVerified email at irisa.fr
Luca MariotAssistant Professor of Computer Science, University of TwenteVerified email at utwente.nl
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Stefanos KoffasPh.D. candidate, Delft University of TechnologyVerified email at tudelft.nl
Marin GolubUniversity of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Marko ĐurasevićAssistant professor, University of Zagreb, Faculty of Electrical Engineering and ComputingVerified email at fer.hr
Alan JovićUniversity of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Karlo KnezevicPh.D., University of Zagreb, Faculty of Electrical Engineering and ComputingVerified email at fer.hr
Carlos A. Coello CoelloProfessor of Computer Science, CINVESTAV-IPNVerified email at cs.cinvestav.mx
Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Follow
Stjepan Picek
Associate professor, Radboud University, The Netherlands
Verified email at computer.org