Loading...
The system can't perform the operation now. Try again later.
Articles
Profiles
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Profiles
My profile
My library
Len Bass
Carnegie Mellon University
Verified email at cmu.edu
Cited by 28582
Software Architecture
user interface software
software engineering
security architecture
DevOps
Thomas Pöppelmann
Senior Principal Engineer at Infineon Technologies AG
Cited by 4576
Security Architecture
Lattice-Based Cryptography
Hardware design
FPGAs
Marcel Winandy
Senior Expert Cyber Security Architect at E.ON
Verified email at eon.com
Cited by 3871
Security Architecture
System Security
Trusted Computing
IoT Security
Uri Blumenthal
Associate Staff, MIT Lincoln Laboratory
Verified email at mit.edu
Cited by 2130
Cryptography
Security Architecture
Network Management
Software Design
Chong Hee KIM
Principal SoC Security Assessor at NXP
Verified email at nxp.com
Cited by 1609
Security architecture
Cryptography
Security evaluation
Side channel analysis
Fault attack
Manel Medina
Professor computer security, network and information security (UPC)
Verified email at ac.upc.edu
Cited by 1209
computer security
network security
information security
security architecture
Alpa Trivedi
Senior Research Scientist, Intel Labs
Verified email at intel.com
Cited by 799
Trusted Computing
Confidential AI/ML Usages
Security Architecture
TEE Technologies
Lars Hermerschmidt
Software Engineering Group, RWTH Aachen University
Verified email at se-rwth.de
Cited by 483
LangSec
Security Architecture
Software Security
Kun Yang
ZJU100 Young Professor, Zhejiang University
Verified email at zju.edu.cn
Cited by 432
Hardware Security
Security Architecture
Vehicle Security
Adam Wedgbury
VP Cyber Security, Bayer
Verified email at bayer.com
Cited by 330
Cyber Security
Industrial Control Systems
Security Architecture
AI
ML
1 - 10
Privacy
Terms
Help
About Scholar
Search help
zproxy.org