Get my own profile
Public access
View all37 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bart PreneelProfessor, KU LeuvenVerified email at esat.kuleuven.be
Carmela TroncosoEPFLVerified email at epfl.ch
Marc JuarezAssistant Professor, School of Informatics - University of EdinburghVerified email at ed.ac.uk
Gunes AcarAssistant Professor at Radboud UniversityVerified email at cs.ru.nl
Seda GursesAssociate Professor TPM, TU Delft, Affiliate COSIC/KU Leuven,Verified email at tudelft.nl
George DanezisMysten Labs & University College LondonVerified email at ucl.ac.uk
Stefaan SeysKU LeuvenVerified email at esat.kuleuven.be
Ero Balsaimec-COSIC KU LeuvenVerified email at esat.kuleuven.be
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Rafa Gálvez VizcaínoKU LeuvenVerified email at kuleuven.be
Arvind NarayananAssociate Professor, Princeton UniversityVerified email at cs.princeton.edu
Steven EnglehardtDuckDuckGoVerified email at princeton.edu
Rachel GreenstadtComputer Science and Engineering Department, New York UniversityVerified email at nyu.edu
Mohsen ImaniAnomali Inc.Verified email at mavs.uta.edu
Nick NikiforakisAssociate Professor, Stony Brook UniversityVerified email at cs.stonybrook.edu
Rob JansenComputer Security Research Scientist, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Sadia AfrozAvast, ICSIVerified email at icsi.berkeley.edu
Paul SyversonMathematician, U.S. Naval Research LaboratoryVerified email at nrl.navy.mil
Sandra SibyImperial College LondonVerified email at imperial.ac.uk