Get my own profile
Public access
View all38 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jörg SchwenkProfessor für Netz- und Datensicherheit, Ruhr-Universität BochumVerified email at rub.de
Dennis HofheinzDepartment of Computer Science, ETH ZürichVerified email at inf.ethz.ch
Sven SchägeEindhoven University of TechnologyVerified email at tue.nl
Juraj SomorovskyPaderborn UniversityVerified email at upb.de
Eike KiltzProfessor of Computer Science, Ruhr-Universität BochumVerified email at rub.de
Kai GellertUniversity of WuppertalVerified email at uni-wuppertal.de
Christoph StriecksAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Andy RuppUniversity of LuxembourgVerified email at rub.de
Sebastian LauerRuhr-Universität BochumVerified email at rub.de
Britta HaleNPSVerified email at nps.edu
Daniel SlamanigAIT Austrian Institute of TechnologyVerified email at ait.ac.at
Saqib A. KakviRoyal Holloway, University of LondonVerified email at rhul.ac.uk
Kristian GjøsteenNTNUVerified email at ntnu.no
Felix GüntherPostdoc, ETH ZurichVerified email at inf.ethz.ch
Denis DiemertUniversity of WuppertalVerified email at uni-wuppertal.de
Nils FleischhackerAssistant Professor, Ruhr-University BochumVerified email at rub.de
Dominique SchröderFull Professor, Computer Science, Friedrich-Alexander-Universität Erlangen-NürnbergVerified email at fau.de
Bogdan WarinschiUniversity of Bristol and DfinityVerified email at cs.bris.ac.uk
David DerlerDFINITYVerified email at dfinity.org
Peter ChvojkaPhD Student, University of WuppertalVerified email at uni-wuppertal.de