Get my own profile
Public access
View all41 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Sven SchägeEindhoven University of TechnologyVerified email at tue.nl
Kai GellertUniversity of WuppertalVerified email at uni-wuppertal.de
Juraj SomorovskyPaderborn UniversityVerified email at upb.de
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Andy RuppUniversity of LuxembourgVerified email at rub.de
Kristian GjøsteenNTNUVerified email at ntnu.no
Sebastian LauerRuhr-Universität BochumVerified email at rub.de
Britta HaleNPSVerified email at nps.edu
Denis DiemertUniversity of WuppertalVerified email at uni-wuppertal.de
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Saqib A. KakviRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Felix GüntherPostdoc, ETH ZurichVerified email at inf.ethz.ch
Nils FleischhackerAssistant Professor, Ruhr-University BochumVerified email at rub.de
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
Peter ChvojkaPhD Student, University of WuppertalVerified email at uni-wuppertal.de
David DerlerDFINITYVerified email at dfinity.org