Get my own profile
Public access
View all45 articles
6 articles
available
not available
Based on funding mandates
Co-authors
Domagoj JakobovićFull professor, University of ZagrebVerified email at fer.hr
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Guilherme PerinLeiden UniversityVerified email at tudelft.nl
Annelie HeuserCNRS researcherVerified email at irisa.fr
Luca MariotAssistant Professor of Computer Science, University of TwenteVerified email at utwente.nl
Lichao WuDelft University of Technology, SGS BrightsightVerified email at tudelft.nl
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Marin GolubSveučilište u ZagrebuVerified email at fer.hr
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
Alan JovićAssociate professor, University of Zagreb, Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
Marko ĐurasevićAssistant professor, University of Zagreb, Faculty of Electrical Engineering and ComputingVerified email at fer.hr
Karlo KnezevicPh.D., University of Zagreb, Faculty of Electrical Engineering and ComputingVerified email at fer.hr
Carlos A. Coello CoelloProfessor of Computer Science, CINVESTAV-IPNVerified email at cs.cinvestav.mx
Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Follow
Stjepan Picek
Associate professor, Radboud University, The Netherlands
Verified email at computer.org