Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dirk HartungAssistant Professor, Yong Pung How School of Law, Singapore Management UniversityVerified email at smu.edu.sg
- Daniel Martin KatzProfessor of Law, Illinois Tech - Chicago Kent College of LawVerified email at kentlaw.iit.edu
- Janis BeckedorfHeidelberg UniversityVerified email at uni-heidelberg.de
- Bastian RieckProfessor, AIDOS Lab, University of FribourgVerified email at unifr.ch
- Jilles VreekenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Sebastian DalleigerKTH Royal Institute of TechnologyVerified email at kth.se
- Maximilian BötherPhD Student @ Systems Group, ETH ZurichVerified email at inf.ethz.ch
- Michael BommaritoBommarito Consulting, LLCVerified email at bommaritollc.com
- Christoph LenzenCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Aristides GionisKTH Royal Institute of Technology, and Aalto UniversityVerified email at kth.se
- Stefan NeumannTU WienVerified email at tuwien.ac.at
- Jeremy WaylandDoctoral Researcher at Helmholtz MunichVerified email at helmholtz-muenchen.de
- Mikko KiveläDepartment of Computer Science, Aalto UniversityVerified email at aalto.fi
- Arash Badie-ModiriPostdoctoral researcher, Central European UniversityVerified email at ceu.edu
Follow
Corinna Coupette
Assistant Professor, Telos Lab, Aalto University
Verified email at aalto.fi - Homepage