Get my own profile
Public access
View all56 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Moritz LippVerified email at mlq.me
- Stefan MangardGraz University of TechnologyVerified email at tugraz.at
- Yuval YaromRuhr University BochumVerified email at rub.de
- Clémentine MauriceCNRSVerified email at cnrs.fr
- Claudio CanellaAmazon Web ServicesVerified email at amazon.com
- Martin SchwarzlGraz University of TechnologyVerified email at iaik.tugraz.at
- Andreas KoglerGraz University of TechnologyVerified email at iaik.tugraz.at
- Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
- Jann HornGoogle Project ZeroVerified email at google.com
- Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
- Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
- Daniel MoghimiSenior Research Scientist, GoogleVerified email at google.com
- Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
- Jonas JuffingerGraz University of TechnologyVerified email at iaik.tugraz.at
- Raphael SpreitzerSGSVerified email at sgs.com
- Marina MinkinUniversity of MichiganVerified email at umich.edu
- Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
- David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
- Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de