Get my own profile
Public access
View all16 articles
1 article
available
not available
Based on funding mandates
Co-authors
Stefan MangardGraz University of TechnologyVerified email at tugraz.at
Mario WernerGraz University of TechnologyVerified email at iaik.tugraz.at
Florian MendelCryptographer & Security Architect - Infineon TechnologiesVerified email at infineon.com
Maria EichlsederGraz University of TechnologyVerified email at iaik.tugraz.at
Christoph DobraunigIntel CorporationVerified email at intel.com
Erich WengerInfineon TechnologiesVerified email at infineon.com
Robert SchillingGraz University of TechnologyVerified email at iaik.tugraz.at
Bart MenninkDigital Security Group, Radboud University, NijmegenVerified email at cs.ru.nl
Robert PrimasGraz University of TechnologyVerified email at iaik.tugraz.at
Fangfei LiuIntel CorporationVerified email at intel.com
Raphael SpreitzerSGSVerified email at sgs.com
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Lukas GinerGraz University of TechnologyVerified email at iaik.tugraz.at
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Josep TorrellasProfessor of Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Christopher W. FletcherAssistant Professor, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Frank K. GürkaynakSenior Scientist, ETH ZurichVerified email at ee.ethz.ch
Luca BeniniETH Zürich, Università di BolognaVerified email at unibo.it
Hannes GrossGraz University of TechnologyVerified email at iaik.tugraz.at
Follow