Get my own profile
Public access
View all67 articles
62 articles
available
not available
Based on funding mandates
Co-authors
- Hwajeong SeoProfessor, Hansung University, South KoreaVerified email at hansung.ac.kr
- Johann GroßschädlResearch Specialist, University of LuxembourgVerified email at uni.lu
- Jongseok ChoiPusan National UniversityVerified email at pusan.ac.kr
- Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
- Ingrid VerbauwhedeKU LeuvenVerified email at esat.kuleuven.be
- Sujoy Sinha RoyAssociate Professor, IAIK, TU GrazVerified email at iaik.tugraz.at
- Patrick LongaPrincipal Researcher, Microsoft Research, USAVerified email at microsoft.com
- Kimmo JärvinenXiphera Ltd.Verified email at xiphera.com
- Geovandro PereiraSecurity Engineer, LG Electronics, USAVerified email at uwaterloo.ca
- Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa
- Reza AzarderakhshProfessor at FAU and Founder of PQSecureVerified email at fau.edu
- Duncan S. WongAssociate Professor of Computer Science, City University of Hong KongVerified email at cityu.edu.hk
- Praveen Kumar VadnalaRiscureVerified email at riscure.com
- Srinivas VivekInternational Institute of Information Technology, BangaloreVerified email at iiitb.ac.in
- David GalindoCTO, Valory AGVerified email at valory.xyz
- Oscar ReparazCOSIC / KU LeuvenVerified email at esat.kuleuven.be
- Erich WengerInfineon TechnologiesVerified email at infineon.com
- Ilya KizhvatovBioNTech SEVerified email at biontech.de
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
- Tobias OderHorst Görtz Institute for IT Security, Ruhr-Universität BochumVerified email at rub.de