Get my own profile
Public access
View all19 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Tim GüneysuChair for Security Engineering, Ruhr-Universität BochumVerified email at rub.de
- Peter SchwabeMPI-SP and Radboud UniversityVerified email at mpi-sp.org
- Léo DucasCWI, Amsterdam & Leiden University, The NetherlandsVerified email at cwi.nl
- Vadim LyubashevskyIBM Research Europe, ZurichVerified email at zurich.ibm.com
- Ingo von MaurichNXP SemiconductorsVerified email at rub.de
- Christof PaarMax Planck Institute for Security and Privacy, BochumVerified email at rub.de
- Stefan NürnbergerVeecle GmbHVerified email at veecle.io
- Thomas SchneiderProfessor of Computer Science, TU DarmstadtVerified email at encrypto.cs.tu-darmstadt.de
- Sven BugielCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
- Zheng GongProfessor of Computer Science, South China Normal UniversityVerified email at scnu.edu.cn
- Francois-Xavier StandaertResearch Director (FNRS-F.R.S), Professor, UCLouvainVerified email at uclouvain.be
- Stéphanie KerckhofPhD Student, ELEN, ICTEAM, EPL, Université catholique de Louvain, BelgiumVerified email at uclouvain.be
- Marcel WinandySenior Expert Cyber Security Architect at E.ONVerified email at eon.com