Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Roya EnsafiAssociate Professor, Computer Science & Engineering, University of MichiganVerified email at umich.edu
Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
Stefan LindskogKarlstad University, SwedenVerified email at kau.se
Markus ZeilingerDepartment for Information Security, University of Applied Sciences Upper AustriaVerified email at fh-hagenberg.at
Eckehard HermannProfessor Secure Software, university of applied sciences upper austriaVerified email at fh-hagenberg.at
Jedidiah CrandallAssociate Professor, Arizona State UniversityVerified email at asu.edu
Tobias PullsAssociate Professor, Karlstad UniversityVerified email at kau.se
Abdullah MueenProfessor, Department of Computer Science, University of New MexicoVerified email at cs.unm.edu
Harald LampesbergerDepartment of Secure Information Systems, University of Applied Sciences Upper Austria, HagenbergVerified email at lampesberger.at
Karsten LoesingThe Tor ProjectVerified email at torproject.org
Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
Nicholas WeaverInternational Computer Science InstituteVerified email at berkeley.edu
Jürgen Fuß (Ecker)Professor of Applied Mathematics and CryptographyVerified email at fh-hagenberg.at
Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
Markus Donko-HuberIndustry since 2017. unmarried name: Markus HuberVerified email at nysos.net
Sebastian SchrittwieserUniversity of ViennaVerified email at univie.ac.at
Martin Schmiedecker (Mulazzani)Bosch Engineering GmbHVerified email at schmiedecker.net
Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
Hadi AsghariTU BerlinVerified email at tu-berlin.de
Rob van EijkVerified email at blaeu.com