Get my own profile
Public access
View all34 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Stefan KatzenbeisserProfessor, Chair of Computer Engineering, University of PassauVerified email at uni-passau.de
Willem JonkerProfessor Database Technology, University of Twente, the NetherlandsVerified email at utwente.nlPieter HartelProfessor Emeritus Cyber securityVerified email at tudelft.nl
Marco CaselliSiemens AGVerified email at siemens.com
Maarten EvertsCTO at Linksight and Assistant Professor at the University of TwenteVerified email at utwente.nl
R.N.J. VeldhuisFull professor, University of TwenteVerified email at utwente.nl
Erik TewsUniversity of TwenteVerified email at utwente.nlMark ManulisProfessor, Head of Privacy and Applied Cryptography Lab @ Universität der Bundeswehr MünchenVerified email at unibw.de
Marc FischlinProfessor of Computer Science, Technische Universität Darmstadt, GermanyVerified email at tu-darmstadt.de
Bertram PoetteringIBM Research Labs - ZurichVerified email at zurich.ibm.comFrank KarglProfessor of Computer Science, Ulm UniversityVerified email at uni-ulm.de
Tang QiangLuxembourg institute of Science and TechnologyVerified email at list.lu
Hoon Wei LimSingtelVerified email at singtel.comHuaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Bram Leendersstudent Distributed Systems and Services, KTH Royal Institute of TechnologyVerified email at kth.se
Rick HofstedeUniversity of TwenteVerified email at utwente.nl
Arjan JeckmansPhD Student, University of TwenteVerified email at utwente.nlBogdan CarbunarFlorida International UniversityVerified email at cs.fiu.edu
Peter T WilliamsVerified email at google.com
Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com