Get my own profile
Public access
View all42 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Sven SchägeEindhoven University of TechnologyVerified email at tue.nl
Kai GellertUniversity of WuppertalVerified email at uni-wuppertal.de
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Juraj SomorovskyPaderborn UniversityVerified email at upb.de
Christoph StriecksSenior Scientist at AIT Austrian Institute of TechnologyVerified email at ait.ac.at
Denis DiemertUniversity of WuppertalVerified email at uni-wuppertal.de
Kristian GjøsteenNTNUVerified email at ntnu.no
Andy RuppUniversity of LuxembourgVerified email at rub.de
Daniel SlamanigProfessor @ Universität der Bundeswehr MünchenVerified email at unibw.de
Saqib A. KakviRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Sebastian LauerZF AGVerified email at rub.de
Britta HaleNPSVerified email at nps.edu
Peter ChvojkaPhD Student, University of WuppertalVerified email at uni-wuppertal.de
Nils FleischhackerAssistant Professor, Ruhr University BochumVerified email at rub.de
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Felix GüntherIBM Research - ZurichVerified email at zurich.ibm.com
Lin LyuBergische Universität WuppertalVerified email at uni-wuppertal.de
David DerlerDFINITYVerified email at dfinity.org