Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Roya EnsafiAssociate Professor, Computer Science & Engineering, University of MichiganVerified email at umich.edu
- Nick FeamsterNeubauer Professor of Computer Science, University of ChicagoVerified email at uchicago.edu
- Stefan LindskogKarlstad University, SwedenVerified email at kau.se
- Markus ZeilingerDepartment for Information Security, University of Applied Sciences Upper AustriaVerified email at fh-hagenberg.at
- Eckehard HermannProfessor Secure Software, university of applied sciences upper austriaVerified email at fh-hagenberg.at
- Jedidiah CrandallAssociate Professor, Arizona State UniversityVerified email at asu.edu
- Tobias PullsAssociate Professor, Karlstad UniversityVerified email at kau.se
- Abdullah MueenProfessor, Department of Computer Science, University of New MexicoVerified email at cs.unm.edu
- Harald LampesbergerDepartment of Secure Information Systems, University of Applied Sciences Upper Austria, HagenbergVerified email at lampesberger.at
- Karsten LoesingThe Tor ProjectVerified email at torproject.org
- Vern PaxsonProfessor, EECS, University of California, BerkeleyVerified email at berkeley.edu
- Nicholas WeaverInternational Computer Science InstituteVerified email at berkeley.edu
- Jürgen Fuß (Ecker)Professor of Applied Mathematics and CryptographyVerified email at fh-hagenberg.at
- Edgar WeipplUniversity of Vienna, Head of SQI CD-Laboratory, SBA ResearchVerified email at univie.ac.at
- Markus Donko-HuberIndustry since 2017. unmarried name: Markus HuberVerified email at nysos.net
- Sebastian SchrittwieserUniversity of ViennaVerified email at univie.ac.at
- Martin Schmiedecker (Mulazzani)Bosch Engineering GmbHVerified email at schmiedecker.net
- Arvind NarayananProfessor, Princeton UniversityVerified email at cs.princeton.edu
- Hadi AsghariTU BerlinVerified email at tu-berlin.de
- Rob van EijkVerified email at blaeu.com