Get my own profile
Public access
View all17 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
- Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
- Stephan HeuserIntelVerified email at heuser.ws
- Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
- Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Stefan NürnbergerVeecle GmbHVerified email at veecle.io
- Bhargava ShastrySecurity researcherVerified email at ethereum.org
- Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyVerified email at ece.gatech.edu
- Christian WachsmannIntel CorporationVerified email at intel.com
- Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Manuel EgeleBoston UniversityVerified email at bu.edu
- Ralf HundRuhr-Universität BochumVerified email at rub.de
- Stephen CheckowayAssociate Professor at Oberlin CollegeVerified email at oberlin.edu
- Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
- Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
- Marcin NagyPhD student, Aalto University, FinlandVerified email at avsystem.com
- Sandeep TamrakarPhD Candidate, Aalto UniverisityVerified email at aalto.fi