Get my own profile
Public access
View all12 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Bernhard JungkAlbstadt-Sigmaringen UniversityVerified email at hs-albsig.deAnnelie HeuserCNRS researcherVerified email at irisa.fr
Michael ZohnerHochschule FuldaVerified email at informatik.hs-fulda.de
Abdulhadi ShoufanKhalifa UniversityVerified email at ku.ac.ae
Axel Y. PoschmannVP of ProductVerified email at pqshield.com
Sylvain GUILLEYSecure-IC, a Cadence CompanyVerified email at secure-ic.com
Victor LomnéNinjaLabVerified email at ninjalab.io
Laurent SauvageInstitut Mines-TélécomVerified email at telecom-paris.frJean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
Dr. Sunil Dath Kumar MalipatlollaCyber Security ManagerVerified email at arriver.com
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Vincent John Mooney IIIAssociate Professor of Electrical and Computer Engineering, Georgia TechVerified email at ece.gatech.edu
Gavin Xiaoxu YaoCity University of Hong KongVerified email at my.cityu.edu.hk
Ray C.C. CheungAssociate Provost (Digital Learning), Professor of Computer Engineering, City University of HongVerified email at cityu.edu.hk
Phuong Ha NguyeneBayVerified email at ebay.com