Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Frank PiessensProfessor of Computer Science, Katholieke Universiteit LeuvenVerified email at cs.kuleuven.be
Daniel GrussGraz University of TechnologyVerified email at iaik.tugraz.at
Raoul StrackxFortanixVerified email at fortanix.com
Daniel GenkinGeorgia TechVerified email at gatech.edu
Marina MinkinUniversity of MichiganVerified email at umich.edu
Michael SchwarzCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
Moritz LippVerified email at mlq.me
Jan Tobias MuehlbergResearcher in Computer Science, KU Leuven, BelgiumVerified email at cs.kuleuven.be
Daniel MoghimiGoogleVerified email at google.com
Thomas F. WenischProf. of CSE, University of MichiganVerified email at umich.edu
Mark SilbersteinAssociate Professor, Technion, IsraelVerified email at ee.technion.ac.il
Baris KasikciUniversity of MichiganVerified email at umich.edu
Ofir WeisseUniversity of MichiganVerified email at umich.edu
David OswaldSecurity and Privacy Group, University of BirminghamVerified email at bham.ac.uk
Flavio D. GarciaProfessor of Computer Security, University of BirminghamVerified email at bham.ac.uk
Claudio CanellaVerified email at iaik.tugraz.at
Julian StecklinaEngineer at Cyberus TechnologyVerified email at os.inf.tu-dresden.de
Rüdiger KapitzaFriedrich-Alexander-Universität Erlangen-NürnbergVerified email at cs.fau.de
Nico WeichbrodtTU Braunschweig, IBRVerified email at ibr.cs.tu-bs.de
Yuval YaromRuhr University BochumVerified email at rub.de