Get my own profile
Public access
View all25 articles
1 article
available
not available
Based on funding mandates
Co-authors
Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nl
Pieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Marco CaselliSiemens AGVerified email at siemens.com
Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
Erik TewsUniversity of TwenteVerified email at utwente.nl
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Mark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.com
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Hoon Wei LimSingtelVerified email at singtel.com
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Bram Leendersstudent Distributed Systems and Services, KTH Royal Institute of TechnologyVerified email at kth.se
Frank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Rick HofstedeUniversity of TwenteVerified email at utwente.nl
Bogdan CarbunarFlorida International UniversityVerified email at cs.fiu.edu
Peter T WilliamsVerified email at google.com
Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nl
Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com