Get my own profile
Public access
View all56 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Domagoj JakobovićUniversity of Zagreb Faculty of electrical engineering and computingVerified email at fer.unizg.hr
- Lejla Batina,Professor, applied cryptography and embedded systems security, Radboud University, The NetherlandsVerified email at cs.ru.nl
- Guilherme PerinLeiden UniversityVerified email at tudelft.nl
- Lichao WuTechnische Universität DarmstadtVerified email at tu-darmstadt.de
- Annelie HeuserCNRS researcherVerified email at irisa.fr
- Luca MariotAssistant Professor of Computer Science, University of TwenteVerified email at utwente.nl
- Shivam BhasinNTU SingaporeVerified email at ntu.edu.sg
- Nele MentensLeiden University and KU LeuvenVerified email at esat.kuleuven.be
- Marin GolubUniversity of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
- Stefanos KoffasPh.D. candidate, Delft University of TechnologyVerified email at tudelft.nl
- Claude CarletProfessor Emeritus, University of Paris 8; also member of the University of Bergen, NorwayVerified email at univ-paris8.fr
- Alan JovićUniversity of Zagreb Faculty of Electrical Engineering and ComputingVerified email at fer.unizg.hr
- Marko ĐurasevićAssistant professor, University of Zagreb, Faculty of Electrical Engineering and ComputingVerified email at fer.hr
- Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
- Karlo KnezevicPh.D., University of Zagreb, Faculty of Electrical Engineering and ComputingVerified email at fer.hr
- Carlos A. Coello CoelloProfessor of Computer Science, CINVESTAV-IPNVerified email at cs.cinvestav.mx
- Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Follow
Stjepan Picek
Associate professor, Radboud University, The Netherlands
Verified email at computer.org