Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Joost RenesNXP SemiconductorsVerified email at nxp.com
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Wilson Vicente RuggieroUniversity of São Paulo, Escola PolitécnicaVerified email at larc.usp.br
- Paulo BarretoUniversity of Washington TacomaVerified email at uw.edu
- Liang-Yee ChengProfessor of Construction Engineering, University of São PauloVerified email at poli.usp.br
- Ricardo ChavesINESC-ID / IST, University of LisbonVerified email at ist.utl.pt
- Jo VliegenResearcher Expert @COSIC/ES&S, ESAT, KULeuven, BelgiumVerified email at esat.kuleuven.be
- Cintia Borges MargiUniversidade de São PauloVerified email at usp.br
- Regina Melo SilveiraProfessor de Engenharia de Computação, Escola Politécnica, Universidade de São PauloVerified email at larc.usp.br
- Rafael Trapani PossignoloIntelVerified email at intel.com
- Laio Burim Vilas BôasMVisiaVerified email at mvisia.com.br
- Lúcia Helena de OliveiraEscola Politécnica da USPVerified email at poli.usp.br
- Barış EgeRiscure B.V.Verified email at riscure.com