Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Roel VerdultFactorIT BVVerified email at factorit.nl
- Peter van RossumVerified email at cs.ru.nl
- Gerhard de Koning GansFactorIT BVVerified email at factorit.nl
- David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
- Bart JacobsProfessor of Software Security and Correctness, Radboud University NijmegenVerified email at cs.ru.nl
- Tom ChothiaUniversity of BirminghamVerified email at cs.bham.ac.uk
- Ronny Wichers SchreurProgrammer, Radboud University NijmegenVerified email at cs.ru.nl
- Jaap-Henk HoepmanAssociate Professor of Computer Science, Radboud University NijmegenVerified email at cs.ru.nl
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
- Eduard MarinSenior Research Scientist at Telefonica ResearchVerified email at telefonica.com
- Jan Van den HerrewegenIndependent researcherVerified email at embercrypt.com
- Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
- Sam L. ThomasChief Scientist, BINARLY, Inc.Verified email at binarly.io
- Andreea-Ina RaduDoctoral Researcher, University of BirminghamVerified email at birmingham.ac.uk
- Eric VerheulPart-time Professor Financial Information Security, Radboud University NijmegenVerified email at cs.ru.nl
- David GalindoCTO, Valory AGVerified email at valory.xyz
- Zitai ChenUniversity of BirminghamVerified email at pgr.bham.ac.uk
- Barış EgeRiscure B.V.Verified email at riscure.com
- Abdulla AldoseriPhD Student, University of BirminghamVerified email at student.bham.ac.uk
Follow
Flavio D. Garcia
Professor of Computer Security, University of Birmingham
Verified email at bham.ac.uk - Homepage