Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Moritz LippGraz University of TechnologyVerified email at iaik.tugraz.at
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Daniel GenkinUniversity of MichiganVerified email at umich.edu
Yuval YaromThe University of AdelaideVerified email at cs.adelaide.edu.au
Clémentine MauriceUniv Lille, CNRS, InriaVerified email at inria.fr
Claudio CanellaGraz University of TechnologyVerified email at iaik.tugraz.at
Anders FoghPrincipal Security Researcher, GDATA Advanced AnalyticsVerified email at gdata-adan.de
Daniel MoghimiUniversity of California San DiegoVerified email at ucsd.edu
Jo Van Bulckimec-DistriNet, KU LeuvenVerified email at cs.kuleuven.be
Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
Martin SchwarzlGraz University of TechnologyVerified email at iaik.tugraz.at
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Berk SunarWorcester Polytechnic InstituteVerified email at wpi.edu
Marina MinkinUniversity of MichiganVerified email at umich.edu
Peter PesslInfineon TechnologiesVerified email at infineon.com
Manuel WeberPHD student of Computer Science, Technical University of GrazVerified email at tugraz.at
Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
Thomas UlzVerified email at tugraz.at
Sarah HaasInfineon Technologies Austria AGVerified email at infineon.com
Michael Schwarz
CISPA Helmholtz Center for Information Security
Verified email at cispa.saarland - Homepage