Get my own profile
Public access
View all18 articles
1 article
available
not available
Based on funding mandates
Co-authors
Lucas Vincenzo DaviUniversity of Duisburg-EssenVerified email at uni-due.de
Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com
Stephan HeuserIntelVerified email at heuser.ws
Srdjan Capkun (Srđan Čapkun)Professor of Computer Science, ETH ZurichVerified email at inf.ethz.ch
Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
N. AsokanProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
Stefan NürnbergerVeecle GmbHVerified email at veecle.io
Bhargava ShastrySecurity researcherVerified email at ethereum.org
Fabian MonroseProfessor, ECE, Georgia Institute of TechnologyVerified email at ece.gatech.edu
Christian WachsmannIntel CorporationVerified email at intel.com
Thorsten HolzCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Manuel EgeleBoston UniversityVerified email at bu.edu
Ralf HundRuhr-Universität BochumVerified email at rub.de
Stephen CheckowayAssociate Professor at Oberlin CollegeVerified email at oberlin.edu
Hovav ShachamProfessor of Computer Science, The University of Texas at AustinVerified email at cs.utexas.edu
Christian RossowCISPA – Helmholtz Center for Information SecurityVerified email at cispa.de
Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
Moti YungDistinguished Research Scientist Google; Adjunct Research Prof. Columbia U.Verified email at cs.columbia.edu
Marcin NagyPhD student, Aalto University, FinlandVerified email at avsystem.com
Sandeep TamrakarPhD Candidate, Aalto UniverisityVerified email at aalto.fi