Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
Stephan HeuserIntelVerified email at heuser.ws
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Stefan NürnbergerELEXIR AGVerified email at elexir.eu
Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyVerified email at ece.gatech.edu
Christian WachsmannIntel Germany GmbH & Co. KGVerified email at intel.com
Manuel EgeleBoston UniversityVerified email at bu.edu
Ralf HundRuhr-Universität BochumVerified email at rub.de
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Stephen CheckowayAssociate Professor at Oberlin CollegeVerified email at oberlin.edu
Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.saarland
Marcin NagyPhD student, Aalto University, FinlandVerified email at aalto.fi
Thomas SchneiderTechnical University of DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Moti YungResearch Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Sandeep TamrakarPhD Candidate, Aalto UniverisityVerified email at aalto.fi
Ahmed TahaSTRDVerified email at strd-eg.com