Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
Giorgio Di NataleCNRS - TIMAVerified email at univ-grenoble-alpes.fr
Jean Da RoltIFRSVerified email at bento.ifrs.edu.br
Marie-Lise FlottesLIRMMVerified email at lirmm.fr
Santosh GhoshIIT Kharagpur India and KU Leuven Belgium and Intel Labs USVerified email at intel.com
Sandhya KoteshwaraIBM Research, University of MinnesotaVerified email at umn.edu
Barış EgeRiscure B.V.Verified email at riscure.com
Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
Keshab K. ParhiUniversity of Minnesota, Erwin A. Kelen Chair in Electrical EngineeringVerified email at umn.edu
Stefaan SeysKU LeuvenVerified email at esat.kuleuven.be
Sophie DupuisLIRMMVerified email at lirmm.fr
Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
Tolga YalcinGoogle, San DiegoVerified email at google.com
Elif Bilge KavunAssistant Professor, Secure Intelligent Systems Research Group, University of PassauVerified email at rub.de
Ahmad-Reza SadeghiTechnische Universität DarmstadtVerified email at trust.tu-darmstadt.de
Selçuk KöseUniversity of RochesterVerified email at ur.rochester.edu
S. Karen KhatamifardPhD candidate of Electrical and Computer Engineering, University of MinnesotaVerified email at umn.edu
Ulya R. KarpuzcuAssociate Professor of Electrical and Computer Engineering, University of Minnesota, Twin-CitiesVerified email at umn.edu
Longfei WangQualcomm Technologies Inc.Verified email at qti.qualcomm.com